Security Of Cryptocurrency Using Hardware Wallet And QR Code
暂无分享,去创建一个
Muzammil Hussain | Amjad Hussain Zahid | Abdul Ghaffar Khan | Usama Riaz | M. Hussain | A. Zahid | Abdul Ghaffar Khan | Usama Riaz
[1] Arati Baliga,et al. Understanding Blockchain Consensus Models , 2017 .
[2] Akanksha Kaushik,et al. Blockchain — Literature survey , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[3] Muzammil Hussain,et al. Crypto-Currency , 2019, FinTech as a Disruptive Technology for Financial Institutions.
[4] D. Birch. What Does Cryptocurrency Mean for the New Economy , 2015 .
[5] Sihua Ma. USING BLOCKCHAIN TO BUILD DECENTRALIZED ACCESS CONTROL IN A PEER-TO-PEER E-LEARNING PLATFORM , 2018 .
[6] Hai Jin,et al. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone , 2018, IEEE Access.
[7] Indrajit Ray,et al. Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..
[8] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[9] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[10] B. B. Zaidan,et al. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.
[11] Usman W. Chohan. The Double Spending Problem and Cryptocurrencies , 2017 .
[12] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[13] Muzammil Hussain,et al. Security and Privacy in FinTech , 2019, Research Anthology on Concepts, Applications, and Challenges of FinTech.
[14] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[15] B. B. Zaidan,et al. A security framework for mHealth apps on Android platform , 2018, Comput. Secur..
[16] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[17] Abdul Ghaffar Khan,et al. Analysis of asymmetric cryptography in information security based on computational study to ensure confidentiality during information exchange , 2018 .
[18] Mikko Huhmo. Blockchain Technology : Bitcoin as a case , 2018 .
[19] B. B. Zaidan,et al. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.
[20] Kunwar Singh,et al. Efficient weighted threshold ECDSA for securing bitcoin wallet , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).
[21] Sunil Kumar Khatri,et al. Role and Aplications of Iot in Online Transactions using Blockchain Technology , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[22] Kim-Kwang Raymond Choo,et al. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service , 2016, J. Netw. Comput. Appl..
[23] Yue Liu,et al. Recognition of QR Code with mobile phones , 2008, 2008 Chinese Control and Decision Conference.
[24] Hauptadministrator,et al. QR code , 2016, The Fairchild Books Dictionary of Fashion.
[25] Joshua A. Kroll,et al. Securing Bitcoin wallets via threshold signatures , 2014 .