Cryptocurrency Bubbles and Costly Mining
ABSTRACT This paper develops a model of a cryptocurrency by incorporating mining into the otherwise standard search‐theoretic monetary framework. As usual, multiple equilibria exist. To obtain a sharp prediction on whether a cryptocurrency' s value will last in the future, I propose a notion of equilibrium refinement based on the feature that mining ...
Kohei Iwasaki
wiley +1 more source
A scalable post quantum secure blockchain framework with adaptive time consensus in cloud environments. [PDF]
Velmurugan M, Kumar MR.
europepmc +1 more source
Scoping Review of Sexual and Gender Minority Health Research in Ireland
ABSTRACT Aim To map existing sexual and gender minority (SGM) health research in Ireland, identify gaps in literature and outline priorities for future research and healthcare. SGM is an umbrella term that includes people who identify as lesbian, gay, bisexual, transgender, queer or intersex and is sometimes abbreviated as LGBTQI+.
John P. Gilmore +7 more
wiley +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Asperity‐Driven Cascading Rupture of a Mw 1.6 Induced Microearthquake
Abstract Studies of small earthquake (M < 2) rupture processes traditionally rely on simplified models that assume symmetric slip or point sources. Using an exceptionally dense seismic network and empirical Green's function (EGF) analysis, we investigate the complex rupture of a Mw 1.6 microearthquake induced by hydraulic fracturing.
Xinxing Chen +3 more
wiley +1 more source
Delegated multi-party private set intersections from extendable output functions. [PDF]
Bay A.
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Multi-factor authentication and key agreement scheme based on PUF and Chebyshev chaotic map for wireless sensor networks. [PDF]
Wang L, Han C.
europepmc +1 more source
Accelerated Feature Selection via Discernibility Hashing: A Rough Set Approach. [PDF]
Luo S, Shi L, Chen L, Cao X.
europepmc +1 more source

