Apraxia 发表于 2025-3-26 23:36:16

http://reply.papertrans.cn/19/1893/189231/189231_31.png

FAR 发表于 2025-3-27 04:58:37

http://reply.papertrans.cn/19/1893/189231/189231_32.png

招待 发表于 2025-3-27 08:34:23

http://reply.papertrans.cn/19/1893/189231/189231_33.png

金桌活画面 发表于 2025-3-27 12:17:32

http://reply.papertrans.cn/19/1893/189231/189231_34.png

SYN 发表于 2025-3-27 17:11:27

http://reply.papertrans.cn/19/1893/189231/189231_35.png

Nonporous 发表于 2025-3-27 21:45:14

http://reply.papertrans.cn/19/1893/189231/189231_36.png

Parley 发表于 2025-3-28 01:30:07

A Security Detection Model for Selfish Mining Attacklockchain technology, its security has become a bottleneck restricting the development. In order to solve the problem, the blockchain structure characteristic can be used to build a security detection model. Taking 51% attack detection as an example, the relationship among attack state, attack inten

加剧 发表于 2025-3-28 02:34:59

Verb Alternations and Extensions, SVP (shortest vector problem) on lattice, it can both resist the quantum computer attacks and have smaller key size, signature size and higher computational efficiency. The proposed cryptocurrency model uses the proposed LRS scheme to ensure the sender’s anonymity and the one-time stealth address t

轻浮女 发表于 2025-3-28 07:03:36

http://reply.papertrans.cn/19/1893/189231/189231_39.png

北极人 发表于 2025-3-28 11:42:15

http://reply.papertrans.cn/19/1893/189231/189231_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Blockchain and Trustworthy Systems; First International Zibin Zheng,Hong-Ning Dai,Xiangping Chen Conference proceedings 2020 Springer Natu