Blockchain: The Iceberg Beneath Bitcoin
|
|
|
- Ellen McCormick
- 10 years ago
- Views:
Transcription
1 Blockchain: The Iceberg Beneath Bitcoin John Callahan, PhD JHU/APL WARNING: many simplificafons ahead
2 bitcoin blockchain
3
4 Barter? =
5 Money: fungibility =
6 Banking
7 Banking
8 Banking
9 Banking
10 Banking
11 Banking
12 Bitcoin: a ledger of financial transfers? previous transfers Assume all previous transfers leave a balance of 8 for each person transac.on amounts RED transac.on amounts BLUE transac.on amounts GREEN
13 Each transacfon: IN = OUT IN(s) OUT(s) hash pointer to previous transacfon returned to sender
14 Bitcoin: a public ledger of financial transac4ons?
15 * Bitcoin: a decentralized, public ledger of transacfons * on a peer- to- peer (p2p) virtual network
16 Step 1: broadcast new transacfon to peers 2 1 1
17 Step 2: append new transacfon to next block
18 Step 3: agempt to solve the block nonce puzzle B 3 D F A Note: no single enfty should own >= 51% of compufng cycles
19 Step 4: solve the block nonce puzzle* B 3 D F A * and collect a small transacfon fee
20 Step 5: broadcast the valid nonce Note: here be race condifons (and vulnerabilifes)
21 Summary 1. YOU Broadcast new transacfon to peers 2. The Bitcoin Network Append new transacfon to the next block Agempt to solve the block nonce puzzle Solve the block nonce puzzle Broadcast the valid nonce 3. PROFIT! :- )
22 Blockchain: latest valid block appended to end of the chain previous block previous block Note: this is a solufon for achieving distributed consensus, but is sfll vulnerable to various agacks* * Details of agacks and counter- measures NOT covered in this talk
23 Blockchain: latest valid block appended to end of the longest chain previous block previous block previous block
24 Blockchain: a generic protocol for transacfons private key: public key: 1CE74 private key: public key: EB451 private key: public key: 88AE7
25 Blockchain: a generic protocol for transacfons dependent on public key encrypfon 4 EB451 1CE74 88AE7 private key: public key: 1CE74 private key: public key: EB451 private key: public key: 88AE7
26 Note: Here be simplificafons previous transacfon 4 signed EB451 1CE74 88AE7 SCRIPTS!
27 Some standard transacfon scripts previous transacfon 4 signed script(s) EB451 1CE74 88AE7 Type Pay to Public Key Hash (P2PKH) Pay to Script Hash (P2SH) MulFsig Null Data Script OP_DUP OP_HASH16 <PubKeyHash> OP_EQUALVERIFY OP_CHECKSIG OP_HASH16 <Hash16(redeemScript)> OP_EQUAL <m> <A pubkey> [B pubkey] [C pubkey] <n> OP_CHECKMULTISIG OP_RETURN < to 4 bytes of data> BY DESIGN, the scripfng language is stack- based and NOT Turing- complete (source: hgps://bitcoin.org/en/developer- guide)
28 Some standard transacfon scripts previous transacfon 4 signed script(s) EB451 1CE74 88AE7 Type Pay to Public Key Hash (P2PKH) Pay to Script Hash (P2SH) MulFsig Null Data Script OP_DUP OP_HASH16 <PubKeyHash> OP_EQUALVERIFY OP_CHECKSIG OP_HASH16 <Hash16(redeemScript)> OP_EQUAL <m> <A pubkey> [B pubkey] [C pubkey] <n> OP_CHECKMULTISIG OP_RETURN < to 4 bytes of data> BY DESIGN, the scripfng language is stack- based and NOT Turing- complete (source: hgps://bitcoin.org/en/developer- guide)
29 OP_RETURN: A decentralized, trusted means to send data
30
31
32
33 Crypto- Currency to Crypto- Economics Thousands Hundred of Thousands Millions Crypto- economy 2. Crypto- economy 3. Decentralized, Autonomous OrganizaFons Smart Contracts Pegged Services TransportaFon Online Storage Mesh Networks Healthcare Wagers BounFes Family Trusts Performance Proofs Escrow Naming IdenFty Ownership Membership VoFng Billions Crypto- economy 1. Currency Transfers Payments Tips Crowdfunding Source: Mougayar 214
34
35
36
37 Source: Pros and Cons Pro Con Freedom of payment Limited adopfon Extremely low fees High value volaflity Micropayments are going without a hitch SFll a bit shaky and unfinished Transparent and neutral Facilitates illegal and dubious pracfces Banking the unbanked No recourse to authority ProtecFon and control Coins can be stolen Lower risk for sellers A new and unfamiliar form of supervision
38
39 Final notes: bumps in the road ahead Told to Richard Feynman by a Buddhist monk: To every man is given the key to the gates of heaven; the same key opens the gates of hell ExisFng and Undiscovered VulnerabiliFes 51% rule Zero- day agacks? Wallet security problems Slow Performance Slow: minutes- to- hours per transacfon When to assume a transacfon is valid? Rule of thumb: aqer 6 blocks The future Lots of Fear- Uncertainty & Doubt (FUD) but one thing is for certain: Blockchain is here to stay
40
41 Credits Noun Project icons Iceberg by Florent from the Noun Project Cow by Chris Pyper from the Noun Project Chicken by Verena Gutentag from the Noun Project Pig by Ealancheliyan from the Noun Project Bitcoin quotes image from Block Chain 2.: The Renaissance of Money, Wired, January 215 Duivestein, Sander, et al., Design to Disrupt Blockchain: cryptoplauorm for a fricfonless economy, SogeF, 215 NASDAQ to develop blockchain services in Estonia, Reuters (Brendan McDermid)
Bitcoin: Concepts, Practice, and Research Directions
Bitcoin: Concepts, Practice, and Research Directions Ittay Eyal, Emin Gün Sirer Computer Science, Cornell University DISC Bitcoin Tutorial, October 2014 Barter Gold Fiat 2 Barter Gold Fiat Bitcoin 2008:
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer
Orwell. From Bitcoin to secure Domain Name System
Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
The World of Emerging Payment Systems A Brief Introduction
The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management
IoT Babelchain. Proof of Understanding. How Machines learn to communicate
IoT Babelchain Proof of Understanding How Machines learn to communicate Benedikt Herudek ([email protected]) April2016 Linux Foundation Open IoT Abstract Having Machines talk to each other is
2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally
Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide
7 Ways Blockchain Technology Could Disrupt The Post-Trade Ecosystem. Kynetix White Paper. Written by: Paul Smyth, CEO
7 Ways Blockchain Technology Could Disrupt The Post-Trade Ecosystem Kynetix White Paper Written by: Paul Smyth, CEO THERE IS DISRUPTION IN THE AIR Over the last year we ve seen a significant rise in interest,
msigna Getting Started
msigna Getting Started Thank you for deciding to try msigna, the most powerful secure cryptocoin storage solution available. We think you will enjoy using msigna as it is, but it is still a product under
BitIodine: extracting intelligence from the Bitcoin network
BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo http://miki.it [email protected] @mikispag Bitcoin BitIodine About Bitcoin Decentralized, global digital currency A global
Regulating AI and Robotics
Regulating AI and Robotics Steve Omohundro, Ph.D. PossibilityResearch.com SteveOmohundro.com SelfAwareSystems.com http://i791.photobucket.com/albums/yy193/rokib50/sculpture/lady-justice-frankfurt_zps970c5d8f.jpg
BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany
BACK OFFICE MANUAL Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany Contents Introduction... 3 Overview of cxadmin... 4 Dashboard... 4 Customer overview... 5 Markets...
Blockchain and Smart Contracts Joe Guagliardo
Blockchain and Smart Contracts Joe Guagliardo Partner and Vice Chair, Technology Practice Group The [financial services] industry has a once-ina-generation opportunity to reimagine and modernize its infrastructure
Bitcoin Miner Optimization
Bitcoin Miner Optimization Nicolas T. Courtois - University College London, UK Bitcoin Mining Bottom Line Bitcoin Mining = a high tech race to determine who will own the currency of the 21 century 2 Nicolas
MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER [email protected] Invictus Innovations, Inc
MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER [email protected] Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Security Mechanisms in Bitcoin
Security Mechanisms in Bitcoin Henrik Lovén Joakim Valberg Email: {henlo585, joava054}@student.liu.se Supervisor: Ulf Kargén, {[email protected]} Project Report for Information Security Course Linköpings
Catch all the digital moments
Catch all the digital moments of your customers Driving digital transformation in the banking sector Banking is clearly evolving in a fast-paced and changing ecosystem, either in terms of regulatory compliance
3. Any medium of exchange (including commodity money) must: a. be easily standardized. b. be widely accepted. c. be divisible. d. be easy to carry.
What is Money? This lecture examines the functions of money, the evolution of the payments system, and how money is measured. Functions of Money A. Medium of Exchange 1. Money is any item that is generally
FEEDBACK BASED REPUTATION ON TOP OF THE
FEEDBACK BASED REPUTATION ON TOP OF THE BITCOIN BLOCKCHAIN Davide Carboni Information Society Department, CRS4, Loc. Piscina Manna, Pula, Italy [email protected] ABSTRACT The ability to assess the reputation
Bank Secrecy Act Regulations Definitions and Other Regulations Relating to Money Services Businesses, 76 FR 43585 (July 21, 2011).
RULING FIN-2015-R001 Issued: August 14, 2015 Subject: Application of FinCEN s Regulations to Persons Issuing Physical or Digital Negotiable Certificates of Ownership of Precious Metals Dear [ ]: This responds
Sia: Simple Decentralized Storage
Sia: Simple Decentralized Storage David Vorick Nebulous Inc. [email protected] Luke Champine Nebulous Inc. [email protected] November 29, 2014 Abstract The authors introduce Sia, a platform for
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
BLOCKCHAIN AND FINANCIAL SERVICES INDUSTRY SNAPSHOT AND POSSIBLE FUTURE DEVELOPMENTS
Q3 2015 BLOCKCHAIN AND FINANCIAL SERVICES INDUSTRY SNAPSHOT AND POSSIBLE FUTURE DEVELOPMENTS 2 Image: Shutterstock, 149395436 = rvlsoft / Shutterstock.com 3 FOREWORD Technological developments, developments
Bitcoin: Regulations and Legal Risks for a New Virtual Currency
Bitcoin: Regulations and Legal Risks for a New Virtual Currency Presented by: John Casey and Adam Holbrook Copyright 2014 by K&L Gates LLP. All rights reserved. GOALS Learn to speak the Bitcoin language:
State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem
State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem The Bitcoin Buzz Bitcoin, the most popular virtual currency in the market today, continues to draw significant
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
Blockchain: A Fundamental Shift for Financial Services Institutions
Cards & Payments the way we see it Blockchain: A Fundamental Shift for Financial Services Institutions What You Need to Know About Blockchain and How to Assess the Opportunity Table of Contents Introduction
Virtual Currencies Bitcoin Risk
Virtual Currencies Bitcoin Risk Mark T. Williams Finance Department [email protected] World Bank Conference Washington, D.C. October 21, 2014 Overview q European Banking Authority has iden4fied over 70 risks
Version v0.0.1. Mark Friedenbach, Jorge Timón. August 24, 2013
Freimarkets: extending bitcoin protocol with user-specified bearer instruments, peer-to-peer exchange, off-chain accounting, auctions, derivatives and transitive transactions Version v0.0.1 Mark Friedenbach,
Blockchain Technology: Preparing for Change
04 Blockchain Technology: Preparing for Change Blockchain Technology: Preparing for Change 04 In Short Blockchain-related Venture Capital $392.86 million in 2015 funding through July Settlement Days Syndicated
AsicBoost A Speedup for Bitcoin Mining
AsicBoost A Speedup for Bitcoin Mining Dr. Timo Hanke March 31, 2016 (rev. 5) Abstract. AsicBoost is a method to speed up Bitcoin mining by a factor of approximately 20%. The performance gain is achieved
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [email protected] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Modes of Operation of Block Ciphers
Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must
GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES
GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES [email protected] Contents Abstract... 3 Background... 3 Security... 3 Data Control... 4 Standards... 4 Payment
What Blockchain Technology Might Mean For Risk Management In Financial Services
Prof. Michael Mainelli, FCCA FCSI FBCS, Executive Chairman, Z/Yen Group What Blockchain Technology Might Mean For Risk Management In Financial Services PRMIA When would we know our financial system is
Customer Support Guide
Customer Support Guide v0.1 BitPay, Inc. https://bitpay.com 2014 BITPAY, Inc. All Rights Reserved. 1 Table of Contents Introduction Contacting Support Payment Data Common Payment Exceptions Underpayment
Laundering Money Online: a review of cybercriminals methods. Executive Summary
Laundering Money Online: a review of cybercriminals methods Jean-Loup Richet Tools and Resources for Anti-Corruption Knowledge June, 01, 2013 - United Nations Office on Drugs and Crime (UNODC). Executive
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
BLOCKCHAIN AND THE LAW:
BLOCKCHAIN AND THE LAW: PRACTICAL IMPLICATIONS OF A REVOLUTIONARY TECHNOLOGY FOR FINANCIAL MARKETS AND BEYOND Monday, April 11, 2016, 12:00 p.m. 1:00 p.m. EST This information is offered for informational
Profit-Driven Abuses of Virtual Currencies
Profit-Driven Abuses of Virtual Currencies Danny Yuxing Huang Department of Computer Science and Engineering University of California, San Diego [email protected] ABSTRACT This paper traces the rise of
BUILDING AN INTERNET FOR TRUST ON A TRUSTLESS INTERNET:
BUILDING AN INTERNET FOR TRUST ON A TRUSTLESS INTERNET: An Evolving Governance Model for Emerging Blockchain and Smart Contract Technologies APrIGF Macau July 1 st 2015 Pindar Wong Chairman VeriFi (Hong
Bitcoin Thief Tutorial
The complete Bitcoin Thief Tutorial SESSION ID: HTA-R02 Uri Rivner Head of Cyber Strategy BioCatch Etay Maor PMM Cyber Trusteer, an IBM Company The first few things you should know about Bitcoin Most people
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Spam, Spam and More Spam. Spammers: Cost to send
Spam, Spam and More Spam cs5480/cs6480 Matthew J. Probst *with some slides/graphics adapted from J.F Kurose and K.W. Ross Spammers: Cost to send Assuming a $10/mo dialup account: 13.4 million messages
Internet Usage (as of November 1, 2011)
ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
For your consideration Senate Economics References Committee - inquiry into digital currency
Committee Secretary Senate Economics Committee PO Box 6100 Parliament House CANBERRA ACT 2600 Reply to: GPO Box 9977 MELBOURNE VIC 3001 Contact officer: Jonathan Woodger Phone: 13 28 69 Fax: 03 9285 1943
Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork).
Issue decentralized securities using Peershare The shutdown of BTC Trading Corp and Litecoin Global has caused me to consider if there is a way for businesses to manage publicly held shares in a decentralized
An Internet Based Anonymous Electronic Cash System
Research Paper American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-4, pp-148-152 www.ajer.org Open Access An Internet Based Anonymous Electronic Cash System
Trends in Healthcare Payments Fifth Annual Report: 2014
Trends in Healthcare Payments Fifth Annual Report: 2014 Published: May 2015 consumers want to pay healthcare bills online page 23 The U.S. healthcare payments market is expected to reach an estimated $5
CASE STUDY LUMIDATA. SQL Toolbelt. Essential tools for SQL Server. 91% of Fortune 100 companies use Red Gate
CASE STUDY LUMIDATA SQL Toolbelt Essential tools for SQL Server 91% of Fortune 100 companies use Red Gate " If you work with SQL Server and don't have SQL Toolbelt, you're likely losing thousands of dollars
The Organization and Performance of Accountable Care Organizations: Early Evidence Thomas D Aunno, Ph.D. Columbia University
The Organization and Performance of Accountable Care Organizations: Early Evidence Thomas D Aunno, Ph.D. Columbia University Innovation in Health Care Delivery Systems McCombs Healthcare Initiative University
Lavinia: An audit-payment protocol for censorship-resistant storage
Lavinia: An audit-payment protocol for censorship-resistant storage Cecylia Bocovich John A. Doucette Ian Goldberg University of Waterloo {cbocovic, j3doucet, iang}@uwaterloo.ca Abstract As distributed
Dani Brunstein Intel Israel November 2014
Dani Brunstein Intel Israel November 2014 Agenda Mutual Introduction, Target and Disclaimer Quick intro on cryptocurrencies and Bitcoin Rate of global acceptance Understanding the Why Disruptive Market
How To Manage Your Eet
The exclusive Australian TomTom distributor. At last, businesses have a single technology partner to deal with. Fleet Tracking. Get your eet working for you. Forum Fleet is TomTom s exclusive Australian
Blockchain, Throughput, and Big Data Trent McConaghy
Blockchain, Throughput, and Big Data Trent McConaghy Bitcoin Startups Berlin Oct 28, 2014 Conclusion Outline Throughput numbers Big data Consensus algorithms ACID Blockchain Big data? Throughput numbers
Blackcoin Obsidian Stealth Wallet Tutorial:
Blackcoin Obsidian Stealth Wallet Tutorial: Step 1: Download the wallet from here: https://github.com/obsidianorg/app/releases/tag/0.3.0 You can always get the latest clients from here: https://github.com/obsidianorg/app/tags
03. Part 03: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies
. Part 0: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies In the final chapter of this series we ll look at some of the most striking technological
Securing the Internet of Things Opportunities and Challenges with scaling IoT solutions
Securing the Internet of Things Opportunities and Challenges with scaling IoT solutions Rob van den Dam Global Telecom Leader IBM Institute for Business Value IoT is IBM s # 1 research area Dublin Research
Engaging title in Green Descriptive element in Blue 2 lines if needed
Blockchain Disrupting the Financial Services Industry? Engaging title in Green Descriptive element in Blue 2 lines if needed Second line optional lorem ipsum B Subhead lorem ipsum, date quatueriure One
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through
Blocks & Chains Decentralized Exchange
Blocks & Chains Decentralized Exchange A Peershare for exchanging cryptoassets by Jordan Lee with contributions from Tom Joad and Michael Witrant (aka sigmike) The arrival of a decentralized exchange has
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED TO PROTECT
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
The New TV World. Horst Peiffer Principal Consultant 2008-05-30
The New TV World Horst Peiffer Principal Consultant 8-5-3 Find answers to the most relevant questions about IPTV, Web TV, and Mobile TV. What are the critical success factors for the new TV services? Who
how to start a answering service business from home
how to start a answering service business from home Topic of the manual is all about the largest of these how to start a answering service business from home will surely have plenty 1000s of different
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
The Ultimate Guide to Buying and Selling Penny Stocks
The Ultimate Guide to Buying and Selling Penny Stocks 1 Table of Contents Part One... Introduction to Penny Stocks 3 Penny Stock Basics? 3 Why Trade Penny Stocks? 4 Where Are Penny Stocks Traded? 4 Part
Augur: a Decentralized, Open-Source Platform for Prediction Markets
Augur: a Decentralized, Open-Source Platform for Prediction Markets Dr. Jack Peterson & Joseph Krug www.augur.net Augur is a trustless, decentralized platform for prediction markets. It is an extension
Re: Regulation of the Conduct of Virtual Currency Businesses Addition of Part 200 to Title 23 NYCRR
Scott Nichols Paybits LLC 848 N. Rainbow Blvd., #523 Las Vegas, NV 89107 August 28, 2014 Mr. Benjamin M. Lawsky Superintendent of Financial Services New York Department of Financial Services One State
Building the Forex Traders Foundation. Greg Michalowski Email: [email protected] www.livestream.com/fxdd Twitter: gregmikefx
Building the Forex Traders Foundation Greg Michalowski Email: [email protected] www.livestream.com/fxdd Twitter: gregmikefx Disclaimer Disclaimer High Risk Warning: All news, opinions, research, data, or other
Monetizing The Internet Of Things: A Convenient How Not To Guide. Paul R Brody Principal & Strategy Leader, Technology Sector July 2015
Monetizing The Internet Of Things: A Convenient How Not To Guide Paul R Brody Principal & Strategy Leader, Technology Sector July 2015 The future is already here, it s just not evenly distributed. William
Working with Motorola RFID
APPFORUM Americas 2012 Working with Motorola RFID Andy Doorty Ι Alliance Manager Adithya Krishnamurthy Ι Solution Manager APPFORUM Americas 2012 RFID Product Overview RFID Architecture RFID API3 for.net
Changing the game: The new face of customer experience
Changing the game: The new face of customer experience Why should you care? I m so close to dropping my bank, because they keep having promos to get new clients, but what are they doing to keep me happy?
UNIFORM ECONOMIC TRANSACTION PROTOCOL. Payments and transactions several perspectives Utrecht, February 2 nd, 2015
UNIFORM ECONOMIC TRANSACTION PROTOCOL Payments and transactions several perspectives Utrecht, February 2 nd, 2015 Presentation given by FOCAFET For Open Convenient And Fair Economic Transactions 1 Who
Multi-Master DF1 Protocol User Guide
Multi-Master DF1 Protocol User Guide Part Number 900-282 Revision B August 2004 Copyright & Trademark Contacts 2002, Lantronix. All rights reserved. No part of the contents of this book may be transmitted
YesFreeCash.com Free Bonus Hunting Tutorial For Beginners
YesFreeCash.com Free Bonus Hunting Tutorial For Beginners Enjoy reading! Written by the team of www.yesfreecash.com 2008 yesfreecash.com This is a guideline written by yesfreecash.com to help people who
