Zobrazeno 1 - 10
of 15
pro vyhledávání: '"David Mödinger"'
Publikováno v:
PLoS ONE, Vol 16, Iss 5, p e0251458 (2021)
Privacy concerns are widely discussed in research and society in general. For the public infrastructure of financial blockchains, this discussion encompasses the privacy of the originator of a transaction broadcasted on the underlying peer-to-peer ne
Externí odkaz:
https://doaj.org/article/b43f708b79b94dbfaf4f7a0f954d73a6
Publikováno v:
PLoS ONE, Vol 15, Iss 12, p e0243475 (2020)
The cryptocurrency system Bitcoin uses a peer-to-peer network to distribute new transactions to all participants. For risk estimation and usability aspects of Bitcoin applications, it is necessary to know the time required to disseminate a transactio
Externí odkaz:
https://doaj.org/article/266986936593476d8f9c248ced976091
Publikováno v:
Lecture Notes in Computer Science
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS)
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.83-98, ⟨10.1007/978-3-030-78198-9_6⟩
Distributed Applications and Interoperable Systems ISBN: 9783030781972
DAIS
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS)
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.83-98, ⟨10.1007/978-3-030-78198-9_6⟩
Distributed Applications and Interoperable Systems ISBN: 9783030781972
DAIS
A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd89f53c0baab443750985a954adfd22
https://hal.inria.fr/hal-03384862/file/509420_1_En_6_Chapter.pdf
https://hal.inria.fr/hal-03384862/file/509420_1_En_6_Chapter.pdf
Publikováno v:
ISEEIE
Peer-to-peer protocols often take longer, are less efficient or can't complete lookup queries with increasing network diameter. Peers could mitigate this by increasing their degree, i.e., their amount of open connections, but this increases the opera
Publikováno v:
2020 The 9th International Conference on Networks, Communication and Computing.
Modern peer-to-peer networks provide a lot of value. However, as the networks handle more and more sensitive data, e.g. in cryptocurrencies, privacy becomes an issue. Several approaches to provide efficient privacy to network participants rely on gro
Autor:
Franz J. Hauck, David Mödinger
Publikováno v:
TrustCom
Privacy concerns have reached the mainstream discourse in society and already had a significant impact on research and technology. Cryptocurrencies have adopted many transaction-level privacy mechanisms to provide privacy in the persisted blockchain.
Publikováno v:
ICDCS
For preserving privacy, blockchains can be equipped with dedicated mechanisms to anonymize participants. However, these mechanism often take only the abstraction layer of blockchains into account whereas observations of the underlying network traffic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a8b47b71922f2080554c87e551792d47
Publikováno v:
EuroS&P Workshops
Surveys indicate that users are often afraid to entrust data to cloud storage providers, because these do not offer sufficient privacy. On the other hand, peer-2-peer–based privacy-preserving storage systems like Freenet suffer from a lack of contr
Publikováno v:
SERIAL@Middleware
In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data rec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c3bb00f0c9738efd25a0087816733588
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-1
Over the last years, demand for file hosting has sky-rocketed due to cost reductions and availability of services. However, centralized providers have a negative impact on the privacy of their users, since they are able to read and collect various da