EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
نویسندگان
چکیده
منابع مشابه
Tamper-Resistant Mobile Health Using Blockchain Technology
BACKGROUND Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and c...
متن کاملA Propositional Proof System for Log Space
The proof system G0 of the quantified propositional calculus corresponds to NC, and G1 corresponds to P , but no formula-based proof system that corresponds log space reasoning has ever been developed. This paper does this by developing GL∗. We begin by defining a class ΣCNF (2) of quantified formulas that can be evaluated in log space. Then GL∗ is defined as G1 with cuts restricted to ΣCNF (2)...
متن کاملA tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particula...
متن کاملDistributed Log-Based Reconciliation
Computer Supported Cooperative Work (CSCW) defines software tools and technology to support groups of people working together on a project, often at different sites [5]. In this work, we present four distributed algorithms for log-based reconciliation, an important NP-hard problem occurring in CSCW. Our methods remove the classical drawbacks of centralized systems like single point of failure, ...
متن کاملTamper-Proof Annotations, By Construction
Current mobile-code formats require veri cation by the code recipient to guard against potentially malicious actions of an incoming mobile program. Such veri cation is needed even when a mobile program originated in a \safe" language such as Java, because the transmission might have been corrupted by an adversary. We describe an alternative approach based on a family of mobile code formats that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2021
ISSN: 1999-5903
DOI: 10.3390/fi13060143