Berg et al., 2019 - Google Patents
Public policy in a blockchain eraBerg et al., 2019
- Document ID
- 12863509200234049370
- Author
- Berg C
- Davidson S
- Potts J
- Publication year
- Publication venue
- Understanding the Blockchain Economy
External Links
Snippet
Digital currencies were always a partly political endeavour. The cryptoanarchists sought to develop new mechanisms to get around the power of the state. Cryptography would be deployed as a weapon against the state. Satoshi Nakamoto wrote that Bitcoin would be 'very …
- 230000001105 regulatory 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Milutinović | Cryptocurrency | |
Arvidsson | Building a cashless society: The Swedish route to the future of cash payments | |
Sharman | Illicit global wealth chains after the financial crisis: Micro-states and an unusual suspect | |
Flore | How blockchain-based technology is disrupting migrants’ remittances: a preliminary assessment | |
Lumsden | The future is mobil: financial inclusion and technological innovation in the emerging world | |
Dniprov et al. | Legal status of cryptocurrency as electronic money | |
Rustem et al. | Problems of criminal responsibility for illegal circulation of cryptocurrency | |
Amato et al. | A fistful of Bitcoins: the Risks and Opportunities of Virtual Currencies | |
Rabbani et al. | Islamic finance and cryptocurrency: a systematic review | |
Valeri et al. | The use of cryptocurrencies for hawala in the Islamic finance | |
Berg et al. | Public policy in a blockchain era | |
Vondráčková | Regulation of virtual currency in the European Union | |
Eenmaa et al. | Regulation through code as a safeguard for implementing smart contracts in no-trust environments | |
Kristof | Autonomous finance | |
Leal Buenfil et al. | Decentralized Finance regulation to foster competition and economic growth | |
Verstappen | Legal Agreements on Smart Contract Platforms in European Systems of Private Law | |
Antunez | Understanding CBDC Money and Blockchain | |
Ovchinnikov et al. | Virtual currency as an object of civil rights in Russia | |
Teichmann et al. | The token and blockchain economy: Risks, opportunities, and implication | |
Nyman et al. | Digitally facilitated economic abuse in the age of digital financial services–new risks for economic abuse in intimate partner violence | |
Morton et al. | The loss and destruction of cryptocurrencies and CGT event C1 | |
Hill | Bitcoin: Is Cryptocurrency Viable? | |
Coutinho et al. | Blockchain and the Law: Dogmatics and Dynamics | |
JP6997900B1 (en) | Electronic money safe deposit box information management and distribution system | |
Bachaev et al. | Cryptocurrency As a Component Of The Digital Economy |