[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Berg et al., 2019 - Google Patents

Public policy in a blockchain era

Berg et al., 2019

Document ID
12863509200234049370
Author
Berg C
Davidson S
Potts J
Publication year
Publication venue
Understanding the Blockchain Economy

External Links

Snippet

Digital currencies were always a partly political endeavour. The cryptoanarchists sought to develop new mechanisms to get around the power of the state. Cryptography would be deployed as a weapon against the state. Satoshi Nakamoto wrote that Bitcoin would be 'very …
Continue reading at www.elgaronline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Similar Documents

Publication Publication Date Title
Milutinović Cryptocurrency
Arvidsson Building a cashless society: The Swedish route to the future of cash payments
Sharman Illicit global wealth chains after the financial crisis: Micro-states and an unusual suspect
Flore How blockchain-based technology is disrupting migrants’ remittances: a preliminary assessment
Lumsden The future is mobil: financial inclusion and technological innovation in the emerging world
Dniprov et al. Legal status of cryptocurrency as electronic money
Rustem et al. Problems of criminal responsibility for illegal circulation of cryptocurrency
Amato et al. A fistful of Bitcoins: the Risks and Opportunities of Virtual Currencies
Rabbani et al. Islamic finance and cryptocurrency: a systematic review
Valeri et al. The use of cryptocurrencies for hawala in the Islamic finance
Berg et al. Public policy in a blockchain era
Vondráčková Regulation of virtual currency in the European Union
Eenmaa et al. Regulation through code as a safeguard for implementing smart contracts in no-trust environments
Kristof Autonomous finance
Leal Buenfil et al. Decentralized Finance regulation to foster competition and economic growth
Verstappen Legal Agreements on Smart Contract Platforms in European Systems of Private Law
Antunez Understanding CBDC Money and Blockchain
Ovchinnikov et al. Virtual currency as an object of civil rights in Russia
Teichmann et al. The token and blockchain economy: Risks, opportunities, and implication
Nyman et al. Digitally facilitated economic abuse in the age of digital financial services–new risks for economic abuse in intimate partner violence
Morton et al. The loss and destruction of cryptocurrencies and CGT event C1
Hill Bitcoin: Is Cryptocurrency Viable?
Coutinho et al. Blockchain and the Law: Dogmatics and Dynamics
JP6997900B1 (en) Electronic money safe deposit box information management and distribution system
Bachaev et al. Cryptocurrency As a Component Of The Digital Economy