Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,465 papers from all fields of science
Search
Sign In
Create Free Account
Proof-of-work system
Known as:
Proof-of-work
, Proof-of work system
, Proof of-work
Expand
A proof-of-work (POW) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Bitcoin
Bitpost
Byzantine fault tolerance
CAPTCHA
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Seele's New Anti-ASIC Consensus Algorithm with Emphasis on Matrix Computation
Luke Zeng
,
S. Xin
,
Avadesian Xu
,
Thomas Pang
,
Tim Yang
,
M. Zheng
arXiv.org
2019
Corpus ID: 152282590
In this paper, we will present a new PoW consensus algorithm used in Seele's main-net, MPoW (Matrix-Proof-of-Work). Compared to…
Expand
2018
2018
Disruptive Power of Blockchain on the Insurance Industry
Adefisayo Akande
,
Fredrik P. Milani
2018
Corpus ID: 44119416
The insurance industry has been a key component of the global economy by the amount of premiums it generates, the scale of its…
Expand
2018
2018
Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks
Shaohan Feng
,
Zehui Xiong
,
D. Niyato
,
Ping Wang
,
S. S. Wang
,
Yang Zhang
Global Communications Conference
2018
Corpus ID: 67865802
Benefit from the capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous…
Expand
2018
2018
Decrypting the Role of Distributed Ledger Technology in Payments Processes
Amber Wadsworth
2018
Corpus ID: 169063984
The financial sector has grown ever more interested in crypto-currencies and the innovative Distributed Ledger Technology (DLT…
Expand
2017
2017
Adding Trust to CAP : Blockchain as a Strong Eventual Consistency Recovery Strategy
Keir Finlow-Bates
2017
Corpus ID: 53059618
The CAP theorem [3] asserts that in any distributed data store only two out of three guarantees can be provided regarding…
Expand
2017
2017
Scalable communication middleware for permissioned distributed ledgers
Artem Barger
,
Yacov Manevich
,
B. Mandler
,
V. Bortnikov
,
Gennady Laventman
,
G. Chockler
Annual Haifa Experimental Systems Conference
2017
Corpus ID: 19234036
Distributed Ledger Technology (DLT) is rapidly emerging as a new paradigm for automating complex business processes in secure and…
Expand
2016
2016
LocalCoin: An ad-hoc payment scheme for areas with high connectivity: poster
Dimitris Chatzopoulos
,
Sujit Gujar
,
B. Faltings
,
P. Hui
ACM Interational Symposium on Mobile Ad Hoc…
2016
Corpus ID: 6959577
The popularity of digital currencies, especially cryptocurrencies, has been continuously growing since the appearance of Bitcoin…
Expand
2016
2016
Information Hiding in the Public RSA Modulus
S. Wüller
,
Marián Kühnel
,
Ulrike Meyer
2016
Corpus ID: 41816162
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way…
Expand
2014
2014
Cuckoo Cycle: a memory-hard proof-of-work system
J. Tromp
IACR Cryptology ePrint Archive
2014
Corpus ID: 17305576
We introduce the first trivially verifiable, scalable, memory-hard and tmto-hard proof-of-work system.
2008
2008
mod kaPoW: Protecting the web with transparent proof-of-work
Edward C. Kaiser
,
Wu-chang Feng
IEEE INFOCOM Workshops
2008
Corpus ID: 11877062
Attacks from automated Web clients are a significant problem on the Internet. Web sites often employ Turing tests known as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE