![]() Fridgen, Gilbert ![]() in ERCIM News (2017), (110), 36--37 Blockchain is considered to be enabling technology that is going beyond the Bitcoin crypto currency. It replaces centralized transaction management by the distribution of transactions across a network of ... [more ▼] Blockchain is considered to be enabling technology that is going beyond the Bitcoin crypto currency. It replaces centralized transaction management by the distribution of transactions across a network of nodes with different methods for consensus finding. This major change of governance may change sectors of our societies far beyond digital currencies. Fraunhofer FIT established a Blockchain Lab in 2016 in order to explore its impact. It will serve as an experience lab for technical components, implementation platforms, application prototypes and blueprints for novel governance, process, and business models. [less ▲] Detailed reference viewed: 116 (0 UL)![]() ; ; Lenzini, Gabriele ![]() in ERCIM News (2013), 2013(94), The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a ... [more ▼] The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a user’s location also gives rise to severe privacy concerns. Within an ESA (European Space Agency) funded project, we have developed a service that not only verifies the correctness of users’ locations but also enables users to control the accuracy of their revealed locations. [less ▲] Detailed reference viewed: 122 (7 UL)![]() ; Klein, Jacques ![]() in ERCIM News (2012), 88 Detailed reference viewed: 79 (1 UL)![]() Biryukov, Alex ![]() ![]() ![]() in ERCIM News (2012), (90), 29-29 Tor is one of the most widely used tools for providing anonymity on the Internet. We have devised novel attacks against the Tor network that can compromise the anonymity of users accessing services that ... [more ▼] Tor is one of the most widely used tools for providing anonymity on the Internet. We have devised novel attacks against the Tor network that can compromise the anonymity of users accessing services that exhibit frequent and predictable communication patterns and users establishing long-lived connections. [less ▲] Detailed reference viewed: 232 (8 UL)![]() Guelfi, Nicolas ![]() ![]() in ERCIM News (2008), 75 Detailed reference viewed: 77 (7 UL)![]() Brust, Matthias R. ![]() ![]() ![]() in ERCIM News (2007), 71 Detailed reference viewed: 77 (3 UL)![]() Rothkugel, Steffen ![]() ![]() ![]() in ERCIM News (2006), Nr. 67 Detailed reference viewed: 44 (4 UL)![]() Capozucca, Alfredo ![]() ![]() ![]() in ERCIM News (2006) Detailed reference viewed: 60 (3 UL) |
||