klotz: identity*

0 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. 2017-10-19 Tags: , by klotz
  2. 2017-10-19 Tags: , by klotz
  3. 2017-10-19 Tags: , , , , by klotz
  4. 2017-10-19 Tags: , , , by klotz
  5. 2017-10-19 Tags: , , by klotz
  6. Build apps that issue and verify blockchain-based certificates for academic credentials, professional certifications, workforce development, and civic records.
    2017-10-09 Tags: , , by klotz
  7. 2017-09-11 Tags: , by klotz
  8. 2017-04-08 Tags: , by klotz
  9. johndo@microsoft.com
    “One can have, some claim, as many electronic personas as one has time and energy to create.”
    – Judith S. Donath 12 »
    Abstract – Large-scale peer-to-peer systems face
    security threats from faulty or hostile remote
    computing elements. To resist these threats, many
    such systems employ redundancy. However, if a
    single faulty entity can present multiple identities,
    it can control a substantial fraction of the system,
    thereby undermining this redundancy. One
    approach to preventing these “Sybil attacks” is to
    have a trusted agency certify identities. This
    paper shows that, without a logically centralized
    authority, Sybil attacks are always possible except
    under extreme and unrealistic assumptions of
    resource parity and coordination among entities.
    2017-01-18 Tags: , , , by klotz
  10. 2012-09-28 Tags: , by klotz

Top of the page

First / Previous / Next / Last / Page 2 of 0 SemanticScuttle - klotz.me: Tags: identity

About - Propulsed by SemanticScuttle