https://libeldoc.bsuir.by/handle/123456789/35669
Title: | Analysis of the block chain use |
Authors: | Vishniakou, U. A. Khudier, R. K. |
Keywords: | материалы конференций;Proof of Work;Proof of Stake |
Issue Date: | 2019 |
Publisher: | БГУИР |
Citation: | Vishniakou, U. A. Analysis of the block chain use / U. A. Vishniakou, R. Kh. Khudier // Технические средства защиты информации : тезисы докладов ХVII Белорусско-российской научно – технической конференции, Минск, 11 июня 2019 г. / Белорусский государственный университет информатики и радиоэлектроники; редкол. : Т. В. Борботько [и др.]. – Минск, 2019. – С. 11 – 12. |
Abstract: | The functioning of the block chain and its security is provided by miners and other block chain participants. Access to the block chain takes place using special keys that guarantee the reliability of the entire network. Every user has it. A key is a set of cryptographic records. It is absolutely unique, which guarantees the impossibility of data substitution and hacker attacks. |
URI: | https://libeldoc.bsuir.by/handle/123456789/35669 |
Appears in Collections: | ТСЗИ 2019 |
File | Description | Size | Format | |
---|---|---|---|---|
Vishniakou_Analysis2.pdf | 190.35 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.