Essays about: "computer Contract"
Showing result 1 - 5 of 9 essays containing the words computer Contract.
-
1. Blockchain-based e-voting system without digital ID: A Proof-of-Concept
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE
-
2. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE
-
3. Modern Credit Value Adjustment
University essay from KTH/Matematik (Avd.)Abstract : Counterparty risk calculations have gained importance after the latest financial crisis. The bankruptcy of Lehman Brothers showed that even large financial institutiones face a risk of default. Hence, it is important to measure the risk of default for all the contracts written between financial institutions. READ MORE
-
4. Feasibility of converting a Science Park in a cold climate into an “off-grid” facility using renewable energies and seasonal storage systems
University essay from Högskolan i Gävle/Avdelningen för byggnadsteknik, energisystem och miljövetenskapAbstract : The collateral effects of fossil fuels push humanity to seek solutions to these adversities. Energy efficiency and renewable energies have gone from being almost imaginary concepts to necessary. Several studies have shown that self-sufficiency through photovoltaic systems and wind energy is possible. READ MORE
-
5. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Malware has proven to be a persistent problem with an increasing amount of variations, and new attack vectors are constantly being taken advantage of. Security specialists are always on the hunt for new technologies useful in the fight against malware. Blockchain technologies bring promises of high integrity, decentralization, and transparency. READ MORE