Results 21 to 30 of about 15,875 (148)
Philanthropy on the Blockchain [PDF]
Part 1: Security in Emerging SystemsInternational audienceOne of the significant innovations that came out of Bitcoin is the blockchain technology. This paper explores how the blockchain can be leveraged in the philanthropic sector, through charitable ...
Akram, Raja Naeem +4 more
core +3 more sources
Implementing TontineCoin [PDF]
One of the alternatives to proof-of-work (PoW) consensus protocols is proof-of- stake (PoS) protocols, which address its energy and cost related issues. But they suffer from the nothing-at-stake problem; validators (PoS miners) are bound to lose nothing ...
Pardeshi, Prashant
core +1 more source
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source
Epistemic Closure in Folk Epistemology [PDF]
We report the results of four empirical studies designed to investigate the extent to which an epistemic closure principle for knowledge is reflected in folk epistemology.
Beebe, James R., Monaghan, Jake
core +1 more source
MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core +1 more source
Analysis of planes of attacks on the Blockchain system
This paper presents a study of attack planessurfaces and possible ways of conducting various attacks on decentralized systems based on Blockchain technology.
P. Stetsenko +2 more
semanticscholar +1 more source
InShopnito: an advanced yet privacy-friendly mobile shopping application [PDF]
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and
Boukayoua, Faysal +9 more
core +2 more sources
Application of E-Wallet: A Preliminary Analysis from the Shariah Perspective
The introduction of the digital wallet known as “E-Wallet” helps people in their transactions without the need for cash, which is known as the phenomenon of “go cashless.” Implementation of the e-wallet is involved with some transactions and concepts ...
International Journal of Fiqh and Usul al-Fiqh Studies
semanticscholar +1 more source
Green in Your Wallet or a Green Planet: Views on Government Spending and Climate Change [PDF]
The scientific community is a near consensus that climate change is not only anthropogenic but is also a major threat to people around the world. Despite the alarm bells from the scientific community many people in the United States simply deny the ...
Butcher, Lincoln M.
core +1 more source
Abstract What happens when venture capitalists try to reinvent housing in their own image? Synonymous with the rise of Big Tech, venture capitalists (VCs) are asset managers that invest in early‐stage companies, pursuing aggressive growth and market domination. Since the 2008 financial crisis, VCs have poured huge sums into real estate start‐ups.
Tim White
wiley +1 more source

