Tradeoffs In Using Blockchain Technology For Security, Privacy, And Decentralization:theoretical And Empirical Perspectives
Abstract
Full Text:
PDFReferences
A. Tošić, “Empirična študija uporabe
tehnologije veriženja blokov v obstoječih sistemih in arhitekturah: doktorska disertacija,”Ph.D. dissertation, Univerza na Primorskem, Fakulteta za matematiko, naravoslovje in . . . ,2022.
E. Bayrak, J. Conley, and S. Wilkie, “The economics of cloud computing,” 2011.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al.,“A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
A. Toši ć, J. Vičič, M. Burnard, and M. Mrissa, “A blockchain protocol for real-time application migration on the edge,” Sensors, vol. 23, no. 9, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/9/4448
D. Boneh, J. Bonneau, B. B ̈unz, and B. Fisch, “Verifiable delay functions,” in Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Pro-ceedings, Part I. Springer, 2018, pp. 757–788.
DOI: https://doi.org/10.31449/inf.v47i2.4965
This work is licensed under a Creative Commons Attribution 3.0 License.