Tethered money : = managing digital ...
Samid, Gideon, (1945-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Tethered money : = managing digital currency transactions /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Tethered money :/ Gideon Samid.
    Reminder of title: managing digital currency transactions /
    Author: Samid, Gideon,
    Description: 1 online resource
    [NT 15003449]: Cover; Title Page; Copyright Page; Dedication; Contents; Purpose; Prologue; Roadmap; Quotations; Introduction: Tethered Money -- a Game Changer; Chapter 1 -- Money: An Irreverent Analysis; Money: the numeric residue of society; Money: mightier than the sword; Money: the great invention; Money is power; Money: man-made mystery; Money: mirage; Money: mirage fraud; Short Range; Reconciliation; Confusion; Self-anchored money; Money on behalf of the people (central banks); Cascaded Digital Money; The Internet of Things, Avatars, and Robotics; Money: changed by cryptography; Is It Working?; Security.
    [NT 15003449]: The Off-CurrencyMoney: tethered; Interest Rate; History; Money: an innovation turtle; "Catch me if you can": the ultimate currency war; Conspiracy theories; Chapter 2 -- Tethered Money: Use and Impact; Earned versus granted; Investment; Management; Tethering Visibility Management; Tethering Flexibility; Surrogate mint/subcontracted tethering; Innovation; Government; The Tax Code; Healthcare; Gambling; Charity; Death Wish; World bank; Emergency management; Insurance; Trust trap; Tethered trade; Tethering trade; Retethering; Personal payment and privacy; Community bootstrapping; Burn pay.
    [NT 15003449]: Pay-as-you-goThe new electricity market; Nanopayments; Access versus use; Napster revived; Loyalty programs; Activation; Imaging; Credit; The banking paradox; In the hands of our adversaries; International scope; Financial democracy (voting with our taxes); Chapter 3 -- Digital Money: The Security Nightmare; Cyber insecurity: always with us!; The general purpose computer and its inherent insecurity; Complexity: where security and insecurity meet; Complexity: how do we manage it today?; Remote access and identity management; Big Data, Not Always so Big; The data/software shared storage.
    [NT 15003449]: Complexity used as a shieldThe quantum threat; The security advantage of digital currency; Deterrence; The Trading Community; Deterrence Through Society at Large; The oracle; Entropic coins; Entropic coins: informative masking; The sub-oracle; Transit security; InterMint security; Tightening the defense perimeter; Digital currency: the complexity route; Durable cryptography; Chapter 4 -- Anatomy of Digital Money Products; Theory and definition of digital coins; Randomized Coins; Nonrandomized Coins; Payment Activity Masking; Bitcoin: the vision; Self-Anchored.
    [NT 15003449]: Generating Money by Agreement to Reward Computational AccomplishmentUsing Transactional Transparency to Safeguard Trading Integrity; Vulnerability to Erosive Cryptographic Intractability; Vulnerability to Leadership Corruption; Finite Amount of Bitcoins; Bitcoin struggle for impact and survival; Stability; Hooking Bitcoin to an External Source of Value; Internal Bitcoin Stabilizer; Bitcoin Vulnerability to Erosive Cryptographic Intractability; Bitcoin Vulnerability to Leadership Corruption; Attacks on Bitcoin; Digitized fiat money and other commodities; Fiat. Bitcoin Currency.
    Subject: Electronic funds transfers. -
    Online resource: https://www.sciencedirect.com/science/book/9780128034774
    ISBN: 9780128034972
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9370778 電子資源 11.線上閱覽_V 電子書 EB HG1710 .S265 2015 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login