Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Structure and Evolution of Bitcoin Transaction Network

The Bitcoin digital crypto-currency has evolved from niche financial technology to major currency, with a market capitalization of $94 billion at the time of this writing. All Bitcoin activity is tracked in a blockchain ledger which maintains a complete history of every Bitcoin transaction. This complete history offers a unique opportunity to analyze the peer-to-peer interactions within the Bit...

متن کامل

Bitcoin Transaction Graph Analysis

Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin’s design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic publickey ids. This leads to a common misconception that it inherently provides a...

متن کامل

Bitcoin Transaction Malleability and MtGox

In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the origina...

متن کامل

Visualizing Dynamic Bitcoin Transaction Patterns

This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral...

متن کامل

Node Verification in Wireless Network

Proof of user identity on network is just like challenge for current scenario. Node verification is the vital procedure for wireless communication. We proposed a verification technique that use hash code for verification and also proposed 2D cryptography technique to maintain data integrity and confidentiality during transmission.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The SIJ Transactions on Computer Networks & Communication Engineering

سال: 2015

ISSN: 2321-239X,2321-2403

DOI: 10.9756/sijcnce/v3i1/03020020101