Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time
نویسندگان
چکیده
منابع مشابه
Structure and Evolution of Bitcoin Transaction Network
The Bitcoin digital crypto-currency has evolved from niche financial technology to major currency, with a market capitalization of $94 billion at the time of this writing. All Bitcoin activity is tracked in a blockchain ledger which maintains a complete history of every Bitcoin transaction. This complete history offers a unique opportunity to analyze the peer-to-peer interactions within the Bit...
متن کاملBitcoin Transaction Graph Analysis
Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin’s design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic publickey ids. This leads to a common misconception that it inherently provides a...
متن کاملBitcoin Transaction Malleability and MtGox
In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the origina...
متن کاملVisualizing Dynamic Bitcoin Transaction Patterns
This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral...
متن کاملNode Verification in Wireless Network
Proof of user identity on network is just like challenge for current scenario. Node verification is the vital procedure for wireless communication. We proposed a verification technique that use hash code for verification and also proposed 2D cryptography technique to maintain data integrity and confidentiality during transmission.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The SIJ Transactions on Computer Networks & Communication Engineering
سال: 2015
ISSN: 2321-239X,2321-2403
DOI: 10.9756/sijcnce/v3i1/03020020101