Mostrando 1,821 - 1,840 Resultados de 1,929 Para Buscar '"Byzantine"', tiempo de consulta: 0.05s Limitar resultados
  1. 1821
    por Frolow, A.
    Publicado 1961
    Libro
  2. 1822
    Publicado 1963
    Libro
  3. 1823
    Publicado 1961
    Libro
  4. 1824
    por Frolow, A.
    Publicado 1965
    Libro
  5. 1825
    por Raes, Alphonse
    Publicado 1947
    991007489459706719
  6. 1826
    por Kaplan, Michel
    Publicado 1992
    Libro
  7. 1827
    por Frolow, A
    Publicado 1965
    Libro
  8. 1828
    por Michel Italikos
    Publicado 1972
    Libro
  9. 1829
  10. 1830
    por Grabar, André, 1896-1990
    Publicado 1968
    Libro
  11. 1831
    Libro
  12. 1832
    Publicado 2022
    Tabla de Contenidos: “…WiFi HaLow -- 7.5 5 G Advanced Security Model -- 7.5.1 Confidentiality -- 7.5.2 Integrity -- 7.5.3 Accessibility -- 7.5.4 Integrated Safety Rule -- 7.5.5 Visibility -- 7.6 Safety Challenges and Resolution of Three-Tiers Structure of 5G Networks -- 7.6.1 Heterogeneous Access Networks -- 7.6.1.1 Safety Challengers -- 7.6.1.2 Safety Resolutions -- 7.6.2 Backhaul Networks -- 7.6.2.1 Safety Challenges -- 7.6.2.2 Safety Resolutions -- 7.6.3 Core Network -- 7.6.3.1 Safety Challenges -- 7.6.3.2 Safety Resolutions -- 7.7 Conclusion and Future Research Directions -- References -- 8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation Systems Gujkan Madaan, Avinash Kumar, and Bharat Bhushan -- 8.1 Introduction -- 8.2 Intelligent Transport System -- 8.2.1 ITS Overview -- 8.2.2 Issues in ITS -- 8.2.3 ITS Role in IoT -- 8.3 Blockchain Technology -- 8.3.1 Overview -- 8.3.2 Types of Blockchain -- 8.3.2.1 Public Blockchain -- 8.3.2.3 Private Blockchain -- 8.2.3.2 Federated Blockchain -- 8.3.3 Consensus Mechanism -- 8.3.3.1 Proof of Work -- 8.3.3.2 Proof of Stake -- 8.3.3.3 Delegated Proof of Stake -- 8.3.3.4 Practical Byzantine Fault Tolerance -- 8.3.3.5 Casper -- 8.3.3.6 Ripple -- 8.3.3.7 Proof of Activity -- 8.3.4 Cryptography -- 8.3.5 Data Management and Its Structure -- 8.4 Blockchain Assisted Intelligent Transportation System -- 8.4.1 Security and Privacy -- 8.4.2 Blockchain and Its Application foe Improving Security and Privacy -- 8.4.3 ITS Based on Blockchain -- 8.4.4 Recent Advancement -- 8.5 Future Research Perspectives -- 8.5.1 Electric Vehicle Recharging -- 8.5.2 Smart City Enabling and Smart Vehicle Security -- 8.5.3 Deferentially-Privacy Preserving Solutions -- 8.5.4 Distribution of Economic Profits and Incentives -- 8.6 Conclusion -- References -- 9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super Capacitors S.N. …”
    Libro electrónico
  13. 1833
    Publicado 2020
    Tabla de Contenidos: “…10.3.3 Describe() and it() test functions -- 10.4 Recap writing of test script -- 10.5 The blind auction test script -- 10.5.1 Analysis of describe() and it() code -- 10.5.2 Executing the blind auction test script -- 10.5.3 Full auction run -- 10.6 Retrospective -- 10.7 Best practices -- 10.8 Summary -- 11 A roadmap to Dapp development -- 11.1 Motivating scenario: Educational credentialing -- 11.2 The roadmap -- 11.3 Problem description -- 11.3.1 Context for the DCC application -- 11.3.2 Design choices -- 11.4 Analysis and design -- 11.4.1 Operation flow and finite state machine -- 11.4.2 Contract diagram -- 11.5 Developing the smart contract -- 11.5.1 Data structures -- 11.5.2 Events -- 11.5.3 Modifiers -- 11.5.4 Functions -- 11.6 Local deployment -- 11.7 Automated testing using truffle -- 11.8 Developing the web application -- 11.8.1 UI design -- 11.8.2 Coding the app.js -- 11.9 Testing the DCC-Dapp -- 11.10 Public deployment -- 11.10.1 Deployment on Ropsten-Infura -- 11.10.2 Create web-client for distribution -- 11.11 Retrospective -- 11.12 Best practices -- Summary -- 12 Blockchain: The road ahead -- 12.1 Decentralized identity -- 12.2 Self-managed identity -- 12.3 Consensus and integrity -- 12.3.1 Proof of work -- 12.3.2 Proof of stake -- 12.3.3 Byzantine fault-tolerant consensus -- 12.4 Scalability -- 12.5 Scalability solutions -- 12.5.1 Side channel -- 12.5.2 Block size -- 12.5.3 Network speed -- 12.6 Privacy -- 12.7 Public, private, and permissioned networks -- 12.8 Confidentiality -- 12.8.1 Open information -- 12.8.2 A solution -- 12.9 Security -- 12.10 Securing it with cryptocurrency -- 12.11 Accessing off-chain data (Oracles) -- 12.12 From foundations to practical systems -- 12.13 Looking ahead -- 12.14 Best practices -- 12.15 Retrospective -- 12.16 Summary -- appendix A. …”
    Libro electrónico
  14. 1834
    por Frolow, A
    Publicado 1961
    Libro
  15. 1835
    por Salaville, S.- Nowack, G
    Publicado 1962
    Libro
  16. 1836
    por Frolow, A.
    Publicado 1961
    Libro
  17. 1837
    por Salaville, Sévérien
    Publicado 1962
    Libro
  18. 1838
    por Darrouzès, Jean, 1912-1990
    Publicado 1986
    Libro
  19. 1839
    por Salaville, Sévérien
    Publicado 1962
    Libro
  20. 1840
    991003006539706719