Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/35669
Title: Analysis of the block chain use
Authors: Vishniakou, U. A.
Khudier, R. K.
Keywords: материалы конференций;Proof of Work;Proof of Stake
Issue Date: 2019
Publisher: БГУИР
Citation: Vishniakou, U. A. Analysis of the block chain use / U. A. Vishniakou, R. Kh. Khudier // Технические средства защиты информации : тезисы докладов ХVII Белорусско-российской научно – технической конференции, Минск, 11 июня 2019 г. / Белорусский государственный университет информатики и радиоэлектроники; редкол. : Т. В. Борботько [и др.]. – Минск, 2019. – С. 11 – 12.
Abstract: The functioning of the block chain and its security is provided by miners and other block chain participants. Access to the block chain takes place using special keys that guarantee the reliability of the entire network. Every user has it. A key is a set of cryptographic records. It is absolutely unique, which guarantees the impossibility of data substitution and hacker attacks.
URI: https://libeldoc.bsuir.by/handle/123456789/35669
Appears in Collections:ТСЗИ 2019

Files in This Item:
File Description SizeFormat 
Vishniakou_Analysis2.pdf190.35 kBAdobe PDFView/Open
Show full item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.