References of "ERCIM News"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailBlockchain Lab : Design, Implementation and Evaluation of Innovative Business and Process Models
Fridgen, Gilbert UL; Prinz, Wolfgang; Rose, Thomas et al

in ERCIM News (2017), (110), 36--37

Blockchain is considered to be enabling technology that is going beyond the Bitcoin crypto currency. It replaces centralized transaction management by the distribution of transactions across a network of ... [more ▼]

Blockchain is considered to be enabling technology that is going beyond the Bitcoin crypto currency. It replaces centralized transaction management by the distribution of transactions across a network of nodes with different methods for consensus finding. This major change of governance may change sectors of our societies far beyond digital currencies. Fraunhofer FIT established a Blockchain Lab in 2016 in order to explore its impact. It will serve as an experience lab for technical components, implementation platforms, application prototypes and blueprints for novel governance, process, and business models. [less ▲]

Detailed reference viewed: 112 (0 UL)
Full Text
Peer Reviewed
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele UL et al

in ERCIM News (2013), 2013(94),

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a ... [more ▼]

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a user’s location also gives rise to severe privacy concerns. Within an ESA (European Space Agency) funded project, we have developed a service that not only verifies the correctness of users’ locations but also enables users to control the accuracy of their revealed locations. [less ▲]

Detailed reference viewed: 121 (7 UL)
Full Text
See detailEvolving Software - Introduction to the Special Theme
Mens, Tom; Klein, Jacques UL

in ERCIM News (2012), 88

Detailed reference viewed: 79 (1 UL)
Full Text
Peer Reviewed
See detailTorScan: Deanonymizing Connections Using Topology Leaks
Biryukov, Alex UL; Pustogarov, Ivan UL; Weinmann, Ralf-Philipp UL

in ERCIM News (2012), (90), 29-29

Tor is one of the most widely used tools for providing anonymity on the Internet. We have devised novel attacks against the Tor network that can compromise the anonymity of users accessing services that ... [more ▼]

Tor is one of the most widely used tools for providing anonymity on the Internet. We have devised novel attacks against the Tor network that can compromise the anonymity of users accessing services that exhibit frequent and predictable communication patterns and users establishing long-lived connections. [less ▲]

Detailed reference viewed: 226 (8 UL)
See detailCORRECT Developing Fault-Tolerant Distributed Systems
Capozucca, Alfredo UL; Gallina, Barbara UL; Guelfi, Nicolas UL et al

in ERCIM News (2006)

Detailed reference viewed: 59 (3 UL)