Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Blockchain technology is a distributed ledger platform that provides open and transparent transaction information with integrity and non-repudiation based on modern cryptography. It is also the technology behind many cryptocurrencies. This presentation will give fundamental knowledge on how blockchain works, its cryptography implementation, cryptocurrency definition and related terms and also blockchain use cases.
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Blockchain technology is a distributed ledger platform that provides open and transparent transaction information with integrity and non-repudiation based on modern cryptography. It is also the technology behind many cryptocurrencies. This presentation will give fundamental knowledge on how blockchain works, its cryptography implementation, cryptocurrency definition and related terms and also blockchain use cases.
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
Slides from Tony Martin-Vegue's presentation at PRMIA 2018 Risk Management and Regulatory Compliance Round Table in San Francisco, CA | April 11, 2018
"Cybersecurity Aspects of Blockchain and Cryptocurrency"
Abstract:
Many companies are considering blockchain technologies to make transactions faster, more secure and cost effective. If you are performing risk analysis on these emerging technologies, you ask be asking yourself: how do I even start to analyze risk when there are so many unknowns? A successful analysis requires a paradigm shift in thinking into two areas: casting aside the defense-in-depth metaphor to describe security controls; and, how we assess and analyze risk of new and emerging technologies that have a high degree of uncertainty.
This talk will cover how to reframe your assessments for emerging technologies, such as blockchain, and how risk quantification methodologies such as Factor Analysis of Information Risk (FAIR) can help answer some of these questions and produce a credible risk assessment.
Overview and clarification of blockchain on following respects: what blockchain is, when it appeared, how it works, who designed/develops it, what it can achieve?
Author : Dr Christian Cachin, IBM
Innovation in Byzantine consensus protocols is helping decentralized networks scale up and become highly performant, possibly faster than centralized networks. Investment growth in Bitcoin and FinTech startups, and enterprise blockchain applications in development in multiple sectors
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Presentation given at an Invited talk at Leicester University. Covers work we are doing at the Open University on applying blockchains/distributed ledgers in the adult educational space
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
Slides from Tony Martin-Vegue's presentation at PRMIA 2018 Risk Management and Regulatory Compliance Round Table in San Francisco, CA | April 11, 2018
"Cybersecurity Aspects of Blockchain and Cryptocurrency"
Abstract:
Many companies are considering blockchain technologies to make transactions faster, more secure and cost effective. If you are performing risk analysis on these emerging technologies, you ask be asking yourself: how do I even start to analyze risk when there are so many unknowns? A successful analysis requires a paradigm shift in thinking into two areas: casting aside the defense-in-depth metaphor to describe security controls; and, how we assess and analyze risk of new and emerging technologies that have a high degree of uncertainty.
This talk will cover how to reframe your assessments for emerging technologies, such as blockchain, and how risk quantification methodologies such as Factor Analysis of Information Risk (FAIR) can help answer some of these questions and produce a credible risk assessment.
Overview and clarification of blockchain on following respects: what blockchain is, when it appeared, how it works, who designed/develops it, what it can achieve?
Author : Dr Christian Cachin, IBM
Innovation in Byzantine consensus protocols is helping decentralized networks scale up and become highly performant, possibly faster than centralized networks. Investment growth in Bitcoin and FinTech startups, and enterprise blockchain applications in development in multiple sectors
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Presentation given at an Invited talk at Leicester University. Covers work we are doing at the Open University on applying blockchains/distributed ledgers in the adult educational space
BLOCKCHAIN, DIGITAL WALLET And CRYPTOCURRENCYsanidulsattar
A Complete Presentation on history, working, analysis of BLOCKCHAIN, DIGITAL WALLET And CRYPTOCURRENCY.
And Crypto mining and how Bitcoin actually works.
A simple interactive ppt on the basics of Blockchain.
What is Blockchain? Why we need it? How it works? Advantages & Disadvantages and many more topics like this.
A blockchain-based Aadhar system: distributed authentication systemTELKOMNIKA JOURNAL
An Aadhaar is a unique number issued to every citizen in India. Aadhar’s current identity authentication relies on the central identities data repository (CDIR) of the unique identification authority of India (UIDAI), which is at risk of a single-point fault attack. Perhaps worse, internal attacks can tamper with the sensitive data of authenticated devices without being detected. In this paper, the proposed system utilizes emerging technology: blockchain for solving the issue of centralized authentication. The proposed system provides a distributed, secure, and tamper-proof ledger platform for Aadhar in that Aadhar is implemented using blockchain ethereum technology. The proposed system considers the unique Aadhar identification (ID) for each citizen of India and registered it on the smart contract of ethereum so that this unique ID may be authenticated by each other in a peer-to-peer network without a central authority. For securing the data, the proposed framework uses hashing technique for significant data (i.e. firmware). Blockchain stores hashed data and instantly any change in the state of the data may be possible to detect.
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.Qutomatic
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
Since the introduction of Bitcoin in 2009 and cryptocurrencies in general, the use of digital currencies has
continued to grow. Early adopters utilized personal computers to complete the necessary steps that would result
in new digital “coins”. Commercial deployment of specialized mining servers, and introduction of mining farms,
followed shortly after.
Similar to Blockchain Security Issues and Challenges (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
1. 1
MPYANA MWAMBA MERLEC
Department of Computer and Engineering
Korea University
Dec. 12, 2017
Blockchain Security Issues
and Challenges
Bitcoin Key Management
Security Issues and Challenges
2. Project Goal
2
We aim to figure out the following questions :
What are the BTC key management security threats ?
How these security risks/issues can be addressed ?
What are the existing approaches and their limitations ?
What are the related challenges ?
The main purpose of this study is to investigate on :
Private key management related security issues and challenges
Bitcoin (BTC) as a BlockChain (BC) application use case
3. Problem Statement
3
Private Key Security[6]
With BC, a private key is regarded as user identity and security credential
Generated and maintained by the user instead of 3rd party agencies
Hartwig et al.[1] discover a vulnerability in ECDSA* scheme
Side-channel attack and invalid-curve attack might be possible
Does not generate enough randomness during the signature process
Attacker can be able to recover the user’s private key
* Elliptic Curve Digital Signature Algorithm
4. Problem Statement
4
Side-channel attacks
Aim to retrieve secret data from a cryptographic system
By observing factors outside the normal computation
invalid-curve attack
Aim to retrieve secret data from a cryptographic system
By observing factors outside the normal computation
5. Problem Statement
5
Private Key Security[6]
Once a user’s private key is lost, it will not be able to recovered
User’s BCT account will face the risks of being tampered by others
If a private key is stolen by criminals
BCT doesn’t dependent on any centralized 3rd party trusted infrastructure
Difficult to track the criminal’s behaviors and recover modified BC information
Decentralized aspect of BC makes the key management task very challenging
6. Bitcoin Keys and Addresses
6
With bitcoin, keys come in pairs:
Private (secret) key = secret PIN or signature on a check
Provides a control over the account and sign TXs
Public key = bank account number
Unique and derived from private key
Bitcoin address = K recipient, represented by its digital fingerprint
Similar to a beneficiary name on a check (i.e. “Pay to the order of”)
Bitcoin address is generated form and corresponds to a public key
Conversion of a public key into a bitcoin
address [2]
A = RIPEMD160(SHA256(K ))K = k * G
G : is the generator point
7. Bitcoin Wallet (BW)
7
Type-2 deterministic (seeded) wallet [2]:
a tree of keys generated from a single seed
Type-0 nondeterministic (random) wallet [2]:
a collection of randomly generated keys
Contains and manages a collection of key pairs
Mostly, k and K are stored together as a Key pair for convenience
Randomly generated number
combined with other data
(i.e. index or chain code)
8. Master Keys Creation & PK extension
8http://chimera.labs.oreilly.com/books/1234000001802/ch04.html#hd_wallets
Creating master keys and chain code from a
root seed [2]
Extending a parent private key to create a
child private key [2]
HMAC : Hash Message Authentication Code
Chain code is used to introduce entropy in the
function that creates child keys from parent keys.
11. BTC Key Management Approaches
11
Works in [3-5] surveyed on the BTC Key management approaches
Found that BTC has several fundamental issues and challenges
It offers opportunities to rethink the key management for end users
First investigation [3] on the usability issues of BTC’s key management
Survey and categorize most known BTC key management proposals
Propose a set of evaluation criteria for BTC key management
12. 1. Keys stored on local device
12
Bitcoin manages several private keys in a bitcoin wallet
Stored on users’ local storage device
Typically in a file or database in a pre-configured file system path.
Bitcoin client can read keys and immediately broadcast TXs over the network
https://news.bitcoin.com/idiot-proof-vault-cold-storage-guide/ https://bitcoinnewsmagazine.com/what-is-the-best-bitcoin-wallet-for-2015/
13. 1. Keys stored on local device
13
Several threats to store keys in local devices [3]:
Files storing private keys can be read by any app.
with access to the user’s application folder
Malware may exploit this key management approach
Access to local files results in the adversary gaining access to the victim’s funds
Users must be aware to not mistakenly share their app. folders
P2P file sharing networks, off-site backups or a shared network drive
https://www.secureworks.com/research/cryptocurrency-stealing-malware-landscapehttps://www.secureworks.com/research/cryptocurrency-stealing-malware-landscape
14. 1. Keys stored on local device
14
Several threats to store keys in a locally[3] :
Physical storage device theft
Especially in case of mobile devices (i.e. laptops or smart phones)
Equipment failure
Due to natural disasters and electrical failures
Undetected storage failure, etc.
Private key files format long-term readability
A trust fund/long-term saving requires PKs to be stored for a long period of time
Users must ensure that keys’ file format can continue to be read
15. 2. Password-protected (encrypted) wallet
15
BCT clients allow a locally stored wallet file to be encrypted
With a key derived from a user-chosen pw or passphrase
This address only physical theft of underlying devices
Brute-force of the pw if the file containing private key is stolen
Share the pros and cons of non-encrypted wallets
If the pw is forgotten, users lose access to their pw-protected wallet
16. 3. Offline keys Storage
16
To further protect private key form malware-based threats
Traditional physical security techniques
required to protect the wallet (e.g. store the drive in a fire-proof safe)
It makes the wallet inaccessible for immediate use by SW
Preventing users from spending funds (unless the offline storage media is nearby)
This approach can be used for backup.
Offline wallets take time to perform TXs
Need to download all blockchain (< 140GB) into the PC
17. 3. Offline keys Storage
17
https://bitcoinpaperwallet.com/
Requires a QR code reader
to read the key back into a Bitcoin client
Securing this is similar to securing cash
Paper wallet doesn’t contain the funds itself
Enables signing authority over a set of Bitcoins
Funds can be stolen from the wallet
By simply observing the QR code
Not possible with physical money
*** Requires printed contents remain unobservable during transportation***
18. 4. Air-gapped & hardware Storage
18
Device holding keys can perform computations
e.g. signing for the keys it holds
Air-gapped device can prevent certain types of theft
By never exposing keys directly to an internet-connected devices
Hardware Security Modules (HSMs) can be used to :
To isolate key materials from host devices
by exposing only the ability to sign transactions
https://trezor.io/
Ledger Wallet
KeepKey
Pi Wallet
* Hardware Security Modules
https://bitcoinarmory.com
19. 5. Password-derived Keys
19
HD wallets [2] deterministically derive a set of private keys
form a master secret key (a user randomly chosen passphrase)
pw holder can view the balance and funds of any sub-account derived from the pw
If one sub-key k is compromised, only the funds of that sub-key
(or sub-keys derived from it) may be stolen
Weak passwords can be found easily through brute-force search
Fingerprint of associated public keys will be in the public ledger
if the account holds any amount of bitcoin
Hierarchical Deterministic
(HD) wallet
https://brainwallet.io/
https://brainwalletx.github.io/
20. 6. Hosted Wallets
20
User wallet is hosted by a trusted third-party WSP*
Key management and storage services are offloaded
No need to perform resource intensive cryptographic operations on devices
WSPs maintain possession of the private keys
Enable user access via standard web authentication mechanisms
May also offer password recovery/reset mechanisms
Users should assume the loss risk
the service could be breached and funds lost
*WSP – Web Service Provider
https://blockchain.info/
21. Super-Wallet [9] : Multi Tiered Storage Scheme
21
https://bitcoinsecurityproject.org/SecureStorage/MultiTieredColdStorageScheme/
As a counter measure to theft, hosted
wallet providers often keep :
Small float of holdings online in hot storage
Majority of holdings offline in cold storage
Causes delays in TXs for users if the
hot storage amount is exhausted.
Implementation complexity
22. Comparison of Key Management Approaches for Bitcoin
Vs Traditional Online Banking Service [3]
22
Client partially awards the benefit
Client is awarded the benefit
23. WRAP UP
23
Most of recent practical security attacks on bitcoin
Leverage weaknesses in the network and consensus layers of BTC BC
to considerably increase the advantage of an adversary
BTC shares many of the fundamental challenges of keys management
known from other domains.
Bitcoin present opportunity to rethink key management for end users
24. [1] Mayer, Hartwig. "ECDSA Security in Bitcoin and Ethereum: a Research Survey." (2016).
[2] Antonopoulos, Andreas M. "Mastering Bitcoin: unlocking digital cryptocurrencies. " O'Reilly Media, Inc., 2014.
[3] Eskandari, Shayan, et al. "A first look at the usability of bitcoin key management." Workshop on Usable Security
(USEC), 2015.
[4] Goldfeder, Steven, et al. "Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme." (2015).
[5] Bonneau, Joseph, et al. "Sok: Research perspectives and challenges for bitcoin and cryptocurrencies." Security
and Privacy (SP), 2015 IEEE Symposium on. IEEE, 2015
[6] Li, Xiaoqi, et al. "A survey on the security of blockchain systems." Future Generation Computer Systems (2017).
[7] RSA Laboratories, “PBKDF2 (Password-Based Key Derivation Function 2),” http://tools.ietf.org/html/rfc2898.
[9] Barber, Simon, et al. "Bitter to better—how to make bitcoin a better currency." International Conference on
Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2012.
[10] Top 10 Security Concerns for Bitcoin Wallets and Exchanges - https://bitcoinsecurityproject.org/topten/
REFERENCES
24