Conference Paper

Distributed Ledger: Definition & Demarcation

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Distributed Ledger (DL) has gained huge attention in the last years and will shift the conduction of business in the future. Until today, because of the great dynamics in the field a systematic approach to structure and define the field of DL does not exist. This led to a heterogeneous landscape of DL definitions and thus, misleading discussions. This paper gives a systematic overview of principles relevant to understand and structure the DL field. Furthermore, based on this it describes DL concepts and shows examples of protocols. The result can then be used for further research

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... 2) Cryptography elements: The cryptography elements form the backbone of DLT and are a key technology for ensuring data security in the transparent execution of transaction processing and consensus building [17]. Cryptography is used on the one hand for the signing and on the other hand for the validation of transactions. ...
... This ensures that blocks that have already been validated by consensus are protected against counterfeiting. According to current knowledge, the cryptography elements used are resistant to attacks by quantum computers and therefore sustainably highly secure [17], [18]. ...
... The probability for the creation of a block by a participant depends on its value share in the network. This creates an intrinsic incentive for validators to work in the interest of the system [17]. Furthermore, participation in the consensus mechanism is simplified as the full node does not require any comparable hardware. ...
Chapter
The current research is devoted to the problem of individual’s victim behavior in the Internet. The victim behavior is a complex one and can be characterized by numerous markers from the classical victimology point of view. Yet, there are no general approaches to identify the victim behavior in the Internet due to the novelty of this communication environment. In this paper the marker of numerous false pseudonyms is presented to identify the individual’s victim behavior, and the cognitive assistant is proposed as a facility to deal with this marker. The cognitive assistant is based on the stylometry analysis, yet this approach has some scalability and velocity issues under the big data conditions. So, the technique for cognitive assistant performance improvement is presented. The basic estimates are made to prove the efficiency of the proposed complex technique, based on the fog-computing and the distributed ledger technology.
ResearchGate has not been able to resolve any references for this publication.