Resource Burning for Permissionless Systems (Invited Paper) (Q5100943): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4967239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5501307 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bootstrapping Public Blockchains Without a Trusted Setup / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communities, Random Walks, and Social Sybil Defense / rank
 
Normal rank
Property / cites work
 
Property / cites work: PoW-Based Distributed Cryptography with No Trusted Setup / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4471321 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs of Space: When Space Is of the Essence / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast byzantine agreement in dynamic networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Byzantine leader election in dynamic networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5743420 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4786018 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5501273 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust random number generation for peer-to-peer systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards a scalable and robust DHT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs of Work from worst-case assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the establishment of distinct identities in overlay networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5422639 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4709170 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318690 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs of Space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4931752 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4828919 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms – ESA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: D2B: A de Bruijn based content-addressable network / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Bitcoin Backbone Protocol: Analysis and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Who are you? Secure identities in single hop ad hoc networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly dynamic distributed computing with byzantine failures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549687 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed Computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Burning money and (pseudo) first-mover advantages: an experimental study on forward induction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ouroboros: a provably secure proof-of-stake blockchain protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4709127 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple proofs of space-time and rational proofs of storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Novel architectures for P2P applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4473888 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A theoretical and empirical evaluation of an algorithm for self-healing computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing communication costs in robust peer-to-peer networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Distributed and Oblivious Heap / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey of DHT security techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434882 / rank
 
Normal rank
Property / cites work
 
Property / cites work: reCAPTCHA: Human-Based Character Recognition via Web Security Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5501272 / rank
 
Normal rank

Latest revision as of 00:58, 30 July 2024

scientific article; zbMATH DE number 7581057
Language Label Description Also known as
English
Resource Burning for Permissionless Systems (Invited Paper)
scientific article; zbMATH DE number 7581057

    Statements

    Resource Burning for Permissionless Systems (Invited Paper) (English)
    0 references
    0 references
    0 references
    0 references
    1 September 2022
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references