For permissionless blockchains, scalability is paramount. While current
...
A Robinson list protects phone subscribers against commercial spam calls...
Public blockchains should be able to scale with respect to the number of...
In many applications, identity management (IdM) is used to associate a
s...
Commercial off-the-shelf DataBase Management Systems (DBMSes) are highly...
The first obstacle that regular users encounter when setting up a node f...
Industrial Control Systems (ICS) are sensible targets for high profile
a...