EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper-Resistant Mobile Health Using Blockchain Technology

BACKGROUND Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and c...

متن کامل

A Propositional Proof System for Log Space

The proof system G0 of the quantified propositional calculus corresponds to NC, and G1 corresponds to P , but no formula-based proof system that corresponds log space reasoning has ever been developed. This paper does this by developing GL∗. We begin by defining a class ΣCNF (2) of quantified formulas that can be evaluated in log space. Then GL∗ is defined as G1 with cuts restricted to ΣCNF (2)...

متن کامل

A tamper-proof and lightweight authentication scheme

We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particula...

متن کامل

Distributed Log-Based Reconciliation

Computer Supported Cooperative Work (CSCW) defines software tools and technology to support groups of people working together on a project, often at different sites [5]. In this work, we present four distributed algorithms for log-based reconciliation, an important NP-hard problem occurring in CSCW. Our methods remove the classical drawbacks of centralized systems like single point of failure, ...

متن کامل

Tamper-Proof Annotations, By Construction

Current mobile-code formats require veri cation by the code recipient to guard against potentially malicious actions of an incoming mobile program. Such veri cation is needed even when a mobile program originated in a \safe" language such as Java, because the transmission might have been corrupted by an adversary. We describe an alternative approach based on a family of mobile code formats that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2021

ISSN: 1999-5903

DOI: 10.3390/fi13060143