نتایج جستجو برای: bitcoin

تعداد نتایج: 2976  

2014
w. j. b. beukema

Bitcoin is a new, popular currency which is based on mathematical and cryptographic principles. The system relies on a decentralized peer-to-peer network of participants in which a majority decides on the validity of transactions. In this paper, the communication protocol used by Bitcoin to communicate between participants is investigated. We formally describe the protocol by specifying it in m...

Journal: :CoRR 2014
Jermain Kaminski Peter A. Gloor

This paper analyzes correlations and causalities between Bitcoin market indicators and Twitter posts containing emotional signals on Bitcoin. Within a timeframe of 104 days (November 23 2013 March 7 2014), about 160,000 Twitter posts containing ”bitcoin” and a positive, negative or uncertainty related term were collected and further analyzed. For instance, the terms ”happy”, ”love”, ”fun”, ”goo...

Journal: :IACR Cryptology ePrint Archive 2018
Indra Deep Mastan Souradyuti Paul

Mounting deanonymization attacks on the unreachable Bitcoin nodes – these nodes do not accept incoming connections – residing behind the NAT is a challenging task. Such an attack was first given by Biryukov, Khovratovich and Pustogarov based on their observation that a node can be uniquely identified in a single session by their directlyconnected neighbouring nodes (ACM CCS’15). However, the BK...

Journal: :IACR Cryptology ePrint Archive 2016
Aggelos Kiayias Giorgos Panagiotakos

A fundamental open problem in the area of blockchain protocols is whether the Bitcoin protocol is the only solution for building a secure transaction ledger. A recently proposed and widely considered alternative is the GHOST protocol which, notably, was proposed to be at the core of Ethereum as well as other recent proposals for improved Bitcoin-like systems. The GHOST variant is touted as o er...

2016
Luisanna Cocco Michele Marchesi

In January 3, 2009, Satoshi Nakamoto gave rise to the "Bitcoin Blockchain", creating the first block of the chain hashing on his computer's central processing unit (CPU). Since then, the hash calculations to mine Bitcoin have been getting more and more complex, and consequently the mining hardware evolved to adapt to this increasing difficulty. Three generations of mining hardware have followed...

2015
David Garcia Frank Schweitzer

The availability of data on digital traces is growing to unprecedented sizes, but inferring actionable knowledge from large-scale data is far from being trivial. This is especially important for computational finance, where digital traces of human behaviour offer a great potential to drive trading strategies. We contribute to this by providing a consistent approach that integrates various datas...

Journal: :CoRR 2017
Arvind Narayanan Malte Möser

In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain — a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the system designer but is instead enabled by d...

2015
Aggelos Kiayias Giorgos Panagiotakos

Transaction processing speed is one of the major considerations in cryptocurrencies that are based on proof of work (POW) such as Bitcoin. At an intuitive level it is widely understood that processing speed is at odds with the security aspects of the underlying POW based consensus mechanism of such protocols, nevertheless the tradeo between the two properties is still not well understood. In th...

Journal: :CoRR 2013
Jan A. Bergstra Karl de Leeuw

The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent but are not owned by any agent. INCOs of an EXIM cannot be stolen, but they can be lost, or thro...

Journal: :CoRR 2018
Husam Al Jawaheri Mashael Al Sabah Yazan Boshmaf Aiman Erbad

With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. We investiga...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید