Possibilities of data protection against unauthorized access are shown employing the method of constructing hash function and digital signature in the blockchain itself. This is implemented using a cryptographic algorithm based on a pseudorandom number generator.doi:10.1007/978-3-030-48256-5_6Olexander BelejKamil StaniecTadeusz Wic...
Administering a high-security device such as an HSM can be a real challenge in relation to sufficient security and controls. In fact, today's standards mandate certain methods and levels of security for HSM administrative (and key management) systems.目录...
Blockchain technology digitizes and distributes record-keeping across a network, so transaction verification processes no longer rely on a single central institution. Blockchains are always distributed butvary widely in permissions, sizes, roles, transparency, types of participants and how transactions a...
A Bitcoin Blockchain explorer may also turn out to be a tool of great value when a user wants to see how current block rewards are distributed to miners who helped in solving the block’s hash code. Although this information may not be vital to everyone, it is an optimal way to see ...
The growing maturity of block chain in the context of the big data era has provided new opportunities for the development of the human resources service industry. This paper analyses the problems of ...
Python dir() function Thedir()function is a library function in Python, it is used to get the list of all properties and methods of an object, it accepts an object and returns a list of all inbuilt, user-defined properties, and methods without the values. ...
This paper aims to provide a systematic review of the ongoing research on the application of blockchain in the sports industry. this work shows that many studies have proposed different use cases for the application of blockchain in the sports industry on and off the field and targeting ...
As each block of transactions is assembled and added to the chain, each block also includes a link to the previous block, forming a chain. If any of the data in a previous block is changed, this link also changes the hash value of the subsequent blocks, creating a fork in the chain....
135 + /// The only supported function at this moment is SHA-256, encoded by a zero byte in this 136 + /// position. 137 + /// 138 + /// Future support for zk-STARKs would require supporting more zk-friendly hash functions. 139 + pub chf: ReservedBytes<1>, 141 140 } 14...
Today many industries implement blockchain in their daily operations and rely on PoCs for optimum functionality. Some of the sectors where PoCs have revolutionized how they function are: Telecom Management FinTech KYC Insurance, among others