Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 83b2f58ea4bc
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 18b70d182ae7
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 8e0c5f5fed6f
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: c2123d61214b
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 0e5a8ea15f96
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 6d27ab7d2528
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
EOT
Digested-Tile 2024-09-12
Authors:: Bry B., Jonny S., and WikiWe contributors License:: CC BY-SA 4.0 Digest Root:: 4e8203a83873
MarkdownTile
References
Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
DeformattedTile
References Standing upon the shoulders of giants… [^1] Jiang, S., Cao, J., McCann, J.A. et al. (2021). Edge computing and blockchain for quick response to COVID-19. Journal of Cloud Computing, 10(1), 1-13. [^2] Roughgarden, T. (2021). Lecture Notes on Blockchain and Cryptocurrencies. Stanford University. [^3] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org. [^4] Grigg, I. (2004). The Ricardian Contract. First IEEE International Workshop on Electronic Contracting. [^5] Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., & Danezis, G. (2019). SoK: Consensus in the Age of Blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies. [^6] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2019). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. [^7] Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACM SIGOPS Operating Systems Review, 36(SI), 31-44. [^8] Gruber, J. (2004). Markdown: Syntax. Daring Fireball. [^9] National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS). FIPS PUB 180-4. [^10] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. In Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378). Springer, Berlin, Heidelberg. [^11] Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), 159-176. [^12] Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. [^13] Croman, K., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. [^14] Kleppmann, M., et al. (2019). Local-first software: you own your data, in spite of the cloud. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 154-178). [^15] Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. [^16] Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., … & Woodford, D. (2013). Spanner: Google’s globally distributed database. ACM Transactions on Computer Systems (TOCS), 31(3), 1-22. [^17] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58. [^18] Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111. [^19] Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015. [^20] Wang, X., & Yu, H. (2005). How to break MD5 and other hash functions. In Annual international conference on the theory and applications of cryptographic techniques (pp. 19-35). Springer, Berlin, Heidelberg. [^21] Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II (pp. 329-334). Springer, New York, NY. [^22] Stim, R. (2016). Patent, copyright & trademark: an intellectual property desk reference. Nolo. [^23] Kline, D., & Rivette, K. G. (2000). Rembrandts in the attic: Unlocking the hidden value of patents. Harvard Business Press. [^24] De Filippi, P., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press. [^25] Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business horizons, 61(4), 567-575. [^26] Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision support systems, 43(2), 618-644. [^27] Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. Journal of economic perspectives, 8(2), 93-115. [^28] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. [^29] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). [^30] Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International conference on the theory and applications of cryptographic techniques (pp. 93-118). Springer, Berlin, Heidelberg. [^31] Danezis, G., & Serjantov, A. (2004). Statistical disclosure or intersection attacks on anonymity systems. In International Workshop on Information Hiding (pp. 293-308). Springer, Berlin, Heidelberg. [^32] Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014). Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 781-796). [^33] Bier, E., Chow, R., Golle, P., King, T. H., & Staddon, J. (2009). The rules of redaction: identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46-53. [^34] Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2021). Decentralized identifiers (DIDs) v1.0. W3C. [^35] Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing.