9 Hits in 5.1 sec

NECTAR: Non-Interactive Smart Contract Protocol using Blockchain Technology [article]

Alexandra Covaci and Simone Madeo and Patrick Motylinski and Stéphane Vincent
2018 arXiv   pre-print
In this paper, we introduce a novel protocol aiming to execute smart contracts as part of a blockchain transaction validation.  ...  Among these technologies, smart contract platforms have the potential to take over functions usually done by intermediaries like banks, escrow or legal services.  ...  In this paper, we introduce NECTAR, i.e. Non intEractive smart ConTrAct pRotocol, aiming to execute smart contracts as part of a blockchain transaction validation 1 .  ... 
arXiv:1803.04860v1 fatcat:lsfzxdhx4jaynit5nwe3a6b22u

Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy

Mohd Majid Akhtar, Danish Raza Rizvi, Mohd Abdul Ahad, Salil S. Kanhere, Mohammad Amjad, Giuseppe Coviello
2021 Sensors  
A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems  ...  This paper discloses the fusion of the Internet of Things (IoT) with the so-called "distributed ledger technology" (DLT).  ...  It is implemented with the help of BCG smart contract and device smart contract for privacy policies.  ... 
doi:10.3390/s21134354 pmid:34202173 fatcat:64qsgnmnqrakxmnp7g2m74yslm

Multi-Party Proof Generation in QAP-based zk-SNARKs [article]

Ali Rahimi, Mohammad Ali Maddah-Ali
2021 arXiv   pre-print
There are various versions of zk-SNARK, among them, Quadratic Arithmetic Program (QAP)-based zk-SNARK has been widely used in practice, specially in Blockchain technology.  ...  Zero-knowledge succinct non-interactive argument of knowledge (zkSNARK) allows a party, known as the prover, to convince another party, known as the verifier, that he knows a private value v, without revealing  ...  Several papers have investigated the problem of outsourcing the task of generating proof. • Nectar [42] : Nectar which is a smart contract protocol, uses zkSNARKs for verification of the correct execution  ... 
arXiv:2103.01344v1 fatcat:woluvtp5yzd5vhgljemefwjzlu

Implementing FAIR Data Infrastructures (Dagstuhl Perspectives Workshop 18472)

Natalia Manola, Peter Mutschke, Guido Scherp, Klaus Tochtermann, Peter Wittenburg, Kathleen Gregory, Wilhelm Hasselbring, Kees den Heijer, Paolo Manghi, Dieter Van Uytvanck
2020 Dagstuhl Manifestos  
While the FAIR data principles provide a promising conceptual basis for developing such data infrastructures, they do not provide technological guidance on how to do so.  ...  Furthermore, research should examine novel provenance concepts such as the use of blockchain technology, e.g., to store transaction records or to encapsulate authorisation decisions in smart contracts,  ...  These "smart contracts" lack the generality and standardization which is required to facilitate data science.  ... 
doi:10.4230/dagman.8.1.1 dblp:journals/dagstuhl-manifestos/ManolaMSTWGHHMU20 fatcat:6z4yhlp3xzahfp7whrdn3x2xa4

The Potential of Cloud Federation

2021 Zenodo  
The use of federated IT service structures to enable effective cloud-to-edge integration as well as secure access, sharing and analysis of distributed data is also described.  ...  The customer must confirm standards compliance as well as service interoperability, contract with each service provider, integrate and use the services and interact with providers for ongoing service management  ...  Individual edge "users" often invest in their own edge infrastructure --for example, in smart city or smart grid applications --but the scale of these investments limits both penetration and adoption.  ... 
doi:10.5281/zenodo.4733566 fatcat:zywgvqxrxrbz5bvmqx3r5ocamu

11,000 researchers gave their views on data sharing, here's what we learned

Mithu Lucraft, Samuel Winthrop
2019 Septentrio Conference Series  
For example, in blockchain technology, a step in this direction has been taken by introducing smart contracts that include specifications of actions that a machine can turn into procedures.  ...  (meta)data are retrievable by their identifier using a standardized communications protocol A1.1. the protocol is free, open and universally implementable A1.2. the protocol allows for an authentication  ...  Data can be downloaded and reused for free, both for commercial and non-commercial purposes.  ... 
doi:10.7557/5.4917 fatcat:lbj5yyjetzekbnc3d54u65sfce

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
For a non-interactive system such as ( :seq) returns the figure is the whole story, since the spec has only two states.  ...  The blockchain ledger underlying the Bitcoin cryptocurrency needs a distributed consensus protocol to make sure that all the copies of the ledger are the same, and the one it uses is based on proof of  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa


D Parate, Karanja Mahavidyalaya
2018 unpublished
In the past few decades there has been a revolution in computing and communications, and all indications are that technological progress and use of information technology will continue.  ...  Using information technology, companies possess the potential to reach more customers, introduce new products and services quickly, and collaborate with suppliers and business partners from all over the  ...  In the present study, we report ecofriendly and green method for the synthesis of sulfur nanoparticles (SNPs) using sodium thiosulfate in presence of leaf extract of C. roseus.The SNPs were conjugated  ... 

Effectiveness of shaping procedure and time in establishing nutritious bushy mulberry groves from cinctured cuttings in the conditions of Khorezm region

Ibrakhim Kurbanov, 1Independent researcher of Department of Sericulture and mulberry, Tashkent State Agrarian University, Chorshanbi Bekkamov, Sokhibova Nigora Sadritdinovna, Docent of Sericulture and mulberry, Tashkent State Agrarian University, Candidate for doctorial degree of Sericulture and mulberry, Tashkent State Agrarian University
2020 International scientific and practical conference CUTTING EDGE-SCIENCE 2   unpublished
The flowers of licorice secrete nectar of 0.10-0.15 mg /, the concentration of nectar is 40-50%. Sweetness is one of the best honey plants of the tugai forest and should be used in a timely manner.  ...  The United States and the People's Republic of China account for nearly 40 percent of the value added in the global ICT sector and 75 percent of blockchain technology patents.  ... 
doi:10.37057/u_2_1 fatcat:mh7gpxgjqvgqvhwcebr6kwmhnq