showing 21-30 of 96 results in 0.19s suggest a link
- Cryptocurrency Payment gateway And Wallet Services | Coinremitter
coinremitter.comA cryptocurrency payment gateway allows companies to accept cryptocurrency transactions as payment from their clients in exchange for products or services. Coinremitter helps businesses accept payment from their customers and clients in the form of cryptocu..
- Major cryptocurrency deanonymization event is imminent | by ontofractal | Medium
medium.com/@ontofractal/major-cryptocurrency-deanonymization-event-is-imminent-1b9efc4dd4b7Cryptocurrency community is all but ignoring an existential risk that may radically change the whole cryptocoin ecosystem. Every time exchanges were hacked, tokens were stolen. The fact that this threat vector is not being heavily discussed either by core t..
- The Cryptocurrency Singularity. October 15, 2017: With the input froma| | by Ramon Tayag | #StartupPH Chronicles | Mediu..
medium.com/startupph-chronicles/the-cryptocurrency-singularity-7e37ae4aa4This caused a shortage of silver that forced Athens to issue new bronze coins with a thin plating of silver. Take another example: given two coins in circulation whose face value is $1, but one is 80% silver and the other is 20% silver, which one would you ..
- Meta-Decentralized Crypto-Currency
fare.tunes.org/computing/mdcc2018.htmlNow, if Alice sends money through Trent who guarantees it, who trusts Alice and whom Bob trusts, then Bob only has to trust Trent, at which point he only has to wait for Trent's confirmation, which can be just as fast as a Credit Card transaction. If and wh..
- Analyzing Cryptocurrency Markets Using Python
blog.patricktriest.com/analyzing-cryptocurrencies-pythonThis is a less traditional choice than some of the more established Python data visualization libraries such as Matplotlib, but I think Plotly is a great choice since it produces fully-interactive charts using D3.js. Here, the dark red values represent stro..
- DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work | USENIX
usenix.org/conference/woot16/workshop-program/presentation/wustrowThe hash-based computational puzzle employed by Bitcoin is instrumental to its security, preventing Sybil attacks and making doublespending attacks more difficult. DDoSCoin allows miners to prove that they have contributed to a distributed denial of service..
- DDoSCoin: Cryptocurrency with a Malicious Proof-Of-Work
- Could Cryptocurrency kill online advertising?
linkedin.com/pulse/could-cryptocurrency-kill-online-advertising-carl-whalleySince code is code, the usual problem of being able to tell the stuff that's wanted from the mining operation makes it difficult to detect, because it's not attempting any security violations such as replicating itself to other sites, spoofing, key logging ..
- Cointabb - Cryptocurrency Price and Market Capitalization
cointabb.comBinance Coin Folgory Coin Maximine Coin
- WO2020060606 CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&_cid=P20-K97WA4-38682-1A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. The cryptocurrency system communicatively coupled to the devic..