A Tree-based Construction for Verifiable Diplomas with Issuer Transparency
暂无分享,去创建一个
Hein Meling | Leander Jehl | Rodrigo Q. Saramago | Vero Estrada-Galinanes | Vero Estrada-Galiñanes | Leander Jehl | Hein Meling
[1] Gus Gutoski,et al. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage , 2015, Financial Cryptography.
[2] Co-Pierre Georg,et al. A privacy-preserving system for data ownership using blockchain and distributed databases , 2018, ArXiv.
[3] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[4] Frank R. Abate,et al. The new Oxford American dictionary , 2001 .
[5] Marko Hölbl,et al. EduCTX: A Blockchain-Based Higher Education Credit Platform , 2017, IEEE Access.
[6] Arno Fiedler,et al. Certificate transparency , 2014, Commun. ACM.
[7] Sid Stamm,et al. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper) , 2011, Financial Cryptography.
[8] W. Erdelen. United Nations Educational, Scientific and Cultural Organization (UNESCO) , 2019, The Grants Register 2020.
[9] Sid Stamm,et al. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL , 2010 .
[10] Laura E. Rumbley,et al. Trends in Global Higher Education: Tracking an Academic Revolution: A Report Prepared for the UNESCO 2009 World Conference on Higher Education , 2010 .
[11] Anthony F. Camilleri,et al. Blockchain in education , 2017, AIP Conference Proceedings.
[12] Nian-Shing Chen,et al. Exploring blockchain technology and its potential applications for education , 2018, Smart Learning Environments.
[13] Clemens Brunner,et al. SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain , 2019, ICISSP.
[14] S. Marginson. Dynamics of National and Global Competition in Higher Education , 2006 .
[15] Arthur Gervais,et al. Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[16] Norman Meuschke,et al. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.
[17] Stephen J. Schultze,et al. Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model , 2013, IEEE Internet Computing.
[18] Sujata Garera,et al. Challenges in teaching a graduate course in applied cryptography , 2009, SGCS.
[19] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .