期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
The rise and fall of cryptocurrencies:defining the economic and social values of blockchain technologies,assessing the opportunities,and defining the financial and cybersecurity risks of the Metaverse
1
作者 Petar Radanliev 《Financial Innovation》 2024年第1期2881-2914,共34页
This study examines blockchain technologies and their pivotal role in the evolving Metaverse,shedding light on topics such as how to invest in cryptocurrency,the mechanics behind crypto mining,and strategies to effect... This study examines blockchain technologies and their pivotal role in the evolving Metaverse,shedding light on topics such as how to invest in cryptocurrency,the mechanics behind crypto mining,and strategies to effectively buy and trade cryptocurrencies.While it contextualises the common queries of"why is crypto crashing?"and"why is crypto down?",the research transcends beyond the frequent market fluctuations to unravel how cryptocurrencies fundamentally work and the step-by-step process on how to create a cryptocurrency.Contrasting existing literature,this comprehensive investigation encompasses both the economic and cybersecurity risks inherent in the blockchain and fintech spheres.Through an interdisciplinary approach,the research transitions from the fundamental principles of fintech investment strategies to the overarching implications of blockchain within the Metaverse.Alongside exploring machine learning potentials in financial sectors and risk assessment methodologies,the study critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies.Moreover,it probes into both enduring and dubious crypto projects,drawing a distinct line between genuine blockchain applications and Ponzi-like schemes.The conclusion resolutely affirms the staying power of blockchain technologies,underlined by a profound exploration of their intrinsic value and a reflective commentary by the author on the potential risks confronting individual investors. 展开更多
关键词 Blockchain technologies Cryptocurrencies Metaverse Decentralised finance(DeFi) Crypto regulations Blockchain standards Risk Value
在线阅读 下载PDF
高集成度TYPE A读写器芯片MF RC500及其应用 被引量:10
2
作者 单承赣 柴斌 姚磊 《国外电子元器件》 2004年第8期34-37,共4页
介绍了高集成度TYPEA读写器芯片MFRC500的内部电路结构 ,并对其内部寄存器的有关命令及加密算法等功能做了较详细的阐述 。
关键词 TYPE A 读写器 FIFO 命令 CRYPTO1
在线阅读 下载PDF
院校网络教育资源共享安全研究 被引量:2
3
作者 张勇 颜峻 翟东锴 《信息工程大学学报》 2009年第3期415-417,共3页
由于用户和应用环境的复杂性,院校网络教育资源需要面向不同的用户群提供不同服务。文章根据院校网络教育资源使用的现状,提出了一种既可灵活部署又能满足不同认证需求的安全访问框架。采用SSL安全协议,设计针对不同应用服务和不同用户... 由于用户和应用环境的复杂性,院校网络教育资源需要面向不同的用户群提供不同服务。文章根据院校网络教育资源使用的现状,提出了一种既可灵活部署又能满足不同认证需求的安全访问框架。采用SSL安全协议,设计针对不同应用服务和不同用户群之间的SSL服务器构件,并通过修改配置,选择认证方式,使院校网络教育资源得以安全共享。 展开更多
关键词 SSL_VPN IPSEC_VPN crypto++
在线阅读 下载PDF
基于CryptoAPI的生物医学真随机数的生成器 被引量:1
4
作者 黄枫 申洪 《第四军医大学学报》 北大核心 2004年第19期1819-1821,共3页
目的 :构建基于MicrosoftCryptoAPI的真随机数生成器 .方法 :在Intel815E芯片组的个人电脑上安装IntelSe curityDriver(ISD)后 ,使用MicrosoftVisualC ++6编程 ,通过CryptGenRandom函数获取真随机数 .结果 :生成的 5 0 0个随机数通过了N... 目的 :构建基于MicrosoftCryptoAPI的真随机数生成器 .方法 :在Intel815E芯片组的个人电脑上安装IntelSe curityDriver(ISD)后 ,使用MicrosoftVisualC ++6编程 ,通过CryptGenRandom函数获取真随机数 .结果 :生成的 5 0 0个随机数通过了NISTFIPS 14 0 1和 χ2 拟合优度检验 (α =0 .0 5 ) ,表明本方法所生成的随机数满足独立性和分布均匀性的要求 .生成 75 0 0个随机数经域值变换后与随机数表中的同等数目的随机数进行了统计学比较 ,结果显示前者的均值偏移、SD ,SE和CV均小于后者 .结论 :基于CryptoAPI的真随机数生成器可以生成满足独立性和分布均匀性的真随机数 . 展开更多
关键词 CRYPTO API INTEL RNG Unit 真随机数 NIST FIPS 140-1 随机数表
在线阅读 下载PDF
Energy crypto currencies and leading U.S.energy stock prices:are Fibonacci retracementsprofitable?
5
作者 Ikhlaas Gurrib Mohammad Nourani Rajesh Kumar Bhaskaran 《Financial Innovation》 2022年第1期187-213,共27页
This paper investigates the role of Fibonacci retracements levels,a popular technical analysis indicator,in predicting stock prices of leading U.S.energy companies and energy cryptocurrencies.The study methodology foc... This paper investigates the role of Fibonacci retracements levels,a popular technical analysis indicator,in predicting stock prices of leading U.S.energy companies and energy cryptocurrencies.The study methodology focuses on applying Fibonacci retracements as a system compared with the buy-and-hold strategy.Daily crypto and stock prices were obtained from the Standard&Poor’s composite 1500 energy index and CoinMarketCap between November 2017 and January 2020.This study also examined if the combined Fibonacci retracements and the price crossover strategy result in a higher return per unit of risk.Our findings revealed that Fibonacci retracement captures energy stock price changes better than cryptos.Furthermore,most price violations were frequent during price falls compared to price increases,supporting that the Fibonacci instrument does not capture price movements during up and downtrends,respectively.Also,fewer consecutive retracement breaks were observed when the price violations were examined 3 days before the current break.Furthermore,the Fibonacci-based strategy resulted in higher returns relative to the naïve buy-and-hold model.Finally,complementing Fibonacci with the price cross strategy did not improve the results and led to fewer or no trades for some constituents.This study’s overall findings elucidate that,despite significant drops in oil prices,speculators(traders)can implement profitable strategies when using technical analysis indicators,like the Fibonacci retracement tool,with or without price crossover rules. 展开更多
关键词 Performance evaluation Energy cryptos Energy stocks Fibonacci retracements
在线阅读 下载PDF
基于Node.js的违章查询系统设计与实现 被引量:1
6
作者 鄢化鹏 聂云峰 +1 位作者 汪涛 吴文波 《软件导刊》 2018年第7期132-134,138,共4页
为解决移动互联网背景下违章查询接口不公开的问题,提出一种基于Node.js的违章查询系统解决方案。通过分析12123APP违章查询接口及其通信加密方式,在获取12123APP与服务器之间的通信加密密匙后,通过Node.js平台下的Crypto模块实现用户与... 为解决移动互联网背景下违章查询接口不公开的问题,提出一种基于Node.js的违章查询系统解决方案。通过分析12123APP违章查询接口及其通信加密方式,在获取12123APP与服务器之间的通信加密密匙后,通过Node.js平台下的Crypto模块实现用户与12123APP服务器之间通信的AES加密解密,最终从12123APP服务器获得违章查询结果。通过对接口进行postman功能测试及Apache JMeter压力测试,实验结果表明,该方法能有效实现违章查询功能,并具有良好的高并发性能。 展开更多
关键词 违章查询 接口 Node.js AES CRYPTO
在线阅读 下载PDF
General Quantum Meet-in-the-Middle Search Algorithm Based on Target Solution of Fixed Weight 被引量:1
7
作者 Xiang-Qun Fu Wan-Su Bao +1 位作者 Xiang Wang Jian-Hong Shi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第10期401-406,共6页
Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fi... Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fixed weight,based on the quantum meet-in-the-middle algorithm,the algorithm for searching all n-product vectors with the same weight is presented,whose complexity is better than the exhaustive search algorithm.And the algorithm can reduce the storage complexity of the quantum meet-in-the-middle search algorithm.Then based on the algorithm and the knapsack vector of the Chor-Rivest public-key crypto of fixed weight d,we present a general quantum meet-in-th√e-middle search algorithm based on the target solution of fixed weight,whose computational complexity is∑(d to j=0)(O((1/2)(C^(d-j)_(n-k+1))+O(C^j_klog C^j_k))with∑(d to i=0)C^i_k memory cost.And the optimal value of k is given.Compared to thequantum meet-in-the-middle search algorithm for knapsack problem and the quantum algorithm for searching a target solution of fixed weight,the computational complexity of the algorithm is lower.And its storage complexity is smaller than the quantum meet-in-the-middle-algorithm. 展开更多
关键词 quantum search algorithm meet-in-the-middle public-key crypto knapsack problem
原文传递
Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography 被引量:1
8
作者 K.Saranya K.Premalatha 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2029-2042,共14页
Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ... Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting. 展开更多
关键词 PRIVACY-PRESERVING crypto policy medical data mining integrity and verification personalized records CRYPTOGRAPHY
在线阅读 下载PDF
Linearity extensions of the market model:a case of the top 10 cryptocurrency prices during the pre‑COVID‑19 and COVID‑19 periods 被引量:1
9
作者 Serdar Neslihanoglu 《Financial Innovation》 2021年第1期799-825,共27页
This research investigates the appropriateness of the linear specification of the market model for modeling and forecasting the cryptocurrency prices during the pre-COVID-19 and COVID-19 periods.Two extensions are off... This research investigates the appropriateness of the linear specification of the market model for modeling and forecasting the cryptocurrency prices during the pre-COVID-19 and COVID-19 periods.Two extensions are offered to compare the performance of the linear specification of the market model(LMM),which allows for the measurement of the cryptocurrency price beta risk.The first is the generalized additive model,which permits flexibility in the rigid shape of the linearity of the LMM.The second is the time-varying linearity specification of the LMM(Tv-LMM),which is based on the state space model form via the Kalman filter,allowing for the measurement of the time-varying beta risk of the cryptocurrency price.The analysis is performed using daily data from both time periods on the top 10 cryptocurrencies by adjusted market capitalization,using the Crypto Currency Index 30(CCI30)as a market proxy and 1-day and 7-day forward predictions.Such a comparison of cryptocurrency prices has yet to be undertaken in the literature.The empirical findings favor the Tv-LMM,which outperforms the others in terms of modeling and forecasting performance.This result suggests that the relationship between each cryptocurrency price and the CCI30 index should be locally instead of globally linear,especially during the COVID-19 period. 展开更多
关键词 CAPM COVID-19 Crypto Currency Index 30 Generalized additive model Kalman filter
在线阅读 下载PDF
A Comprehensive Study of Algebraic Fault Analysis on PRINCE
10
作者 ZHANG Fan ZHAO Xinjie +3 位作者 GUO Shize SHEN Jizhong HUANG Jing HU Zijie 《China Communications》 SCIE CSCD 2015年第7期127-141,共15页
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES... PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively. 展开更多
关键词 algebraic fault analysis PRINCE Crypto Mini SAT
在线阅读 下载PDF
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
11
作者 Gulain Mugaruka Buduge Jérémie Ndikumagenge Justin Buhendwa Nyenyezi 《Journal of Information Security》 2022年第4期312-322,共11页
This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two dis... This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two distinct tools to secure data and in this particular case, academic data of higher and university education in the Democratic Republic of the Congo. The design of algorithms meets the approach that any researcher in data encryption must use during the development of a computer system. Briefly, these algorithms are steps to follow to encrypt information in any programming language. These algorithms are based on symmetric and asymmetric encryption, the first one uses Christopher Hill’s algorithm, which uses texts in the form of matrices before they are encrypted and RSA as one of the asymmetric algorithms, it uses the prime numbers that we have encoded on more than 512 bits. As for tools, we have developed them in php which is only a programming language taken as an example because it is impossible to use all of them. The tools implemented are based on the algorithms of Caesar, Christopher Hill, and RSA showing how the encryption operations are carried out thanks to graphical interfaces. They are only tools for pedagogical reasons to help students and other researchers learn how to use developed algorithms. We have not developed them for pleasure but rather to be used in any information system, which would prevent and limit unauthorized access to computer systems. They will not be used only for the management of academic fees but for any other information system, which explains and shows the complexity of the tools developed. We have not been able to solve the problems of versions for the developed prototype, because if there is a new version later some functions may be obsolete, which would constitute the limitation of these tools. This work targets primarily the Ministry of Higher Education and Universities, which will make these results its own and implement them in order to solve the problem of intrusions, and unauthorized access to developers and researchers who will use tools already made instead of thinking about their development. We are trying to demonstrate the steps and the methodology that allowed us to reach our results, in the following lines. 展开更多
关键词 COMPUTER SECURITY Crypto Systems and Analysis ALGORITHMS ENCRYPTION/DECRYPTION
在线阅读 下载PDF
基于智能卡的CSP设计与实现
12
作者 许梦华 《软件导刊》 2012年第10期130-131,共2页
智能卡由于其安全性高、携带方便、价格便宜等特点被广泛应用,基于智能卡的CSP也得以迅速发展。在分析微软加密理论的基础上,详细介绍了一种基于智能卡的CSP设计方法和实现流程,应用程序通过Crypto API方便、快捷地完成了智能卡提供的... 智能卡由于其安全性高、携带方便、价格便宜等特点被广泛应用,基于智能卡的CSP也得以迅速发展。在分析微软加密理论的基础上,详细介绍了一种基于智能卡的CSP设计方法和实现流程,应用程序通过Crypto API方便、快捷地完成了智能卡提供的一整套加密操作。 展开更多
关键词 智能卡 CSP CRYPTO API
在线阅读 下载PDF
Multi-platform wallet for privacy protection and key recovery in decentralized applications
13
作者 Cristòfol Daudén-Esmel Jordi Castellà-Roca +1 位作者 Alexandre Viejo Ignacio Miguel-Rodríguez 《Blockchain(Research and Applications)》 2025年第1期54-77,共24页
In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engag... In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engage with dApps,users require a blockchain wallet.This tool facilitates the generation and secure storage of a user’s private key and verfies their identity,among other functionalities.Despite their utility,blockchain wallets present significant challenges,such as reliance on trusted third parties,vulnerability to adversaries observing and potentially linking user interactions,key recovery issues,and synchronization of cryptographic keys across multiple devices.This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System(IPFS)technologies for managing asymmetric keys and enabling key recovery.This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage.The proposed system is economically viable,with in-depth cost analysis,and demonstrates resilience against security and privacy attacks.A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions.Finally,a preliminary prototype implementation is presented to validate the system’s feasibility. 展开更多
关键词 Decentralized applications Crypto wallet Smart contract Key recovery Security PRIVACY
原文传递
Quantum public-key crypto via EPR pairs
14
作者 Xiang-Qun Fu Hong-Wei Li +2 位作者 Jian-Hong Shi Tan Li Wan-Su Bao 《Science China(Physics,Mechanics & Astronomy)》 2025年第1期54-59,共6页
With the development of quantum computing technology,quantum public-key cryptography is gradually becoming an alternative to the existing classical public-key cryptography.This paper designs a quantum trapdoor one-way... With the development of quantum computing technology,quantum public-key cryptography is gradually becoming an alternative to the existing classical public-key cryptography.This paper designs a quantum trapdoor one-way function via EPR pairs and quantum measurements.Based on this,a new quantum public-key cryptosystem is presented,which offers forward security,and can resist the chosen-plaintext attack and chosen-ciphertext attack.Compared with the existing quantum public-key cryptos,eavesdropping can be automatically detected in this new quantum public-key cryptosystem under a necessary condition,which is also detailed in the paper. 展开更多
关键词 quantum public-key crypto trapdoor one-way function EPR pairs
原文传递
General Method of Combining Grover and Simon for Attacking Block Ciphers
15
作者 Fu Xiangqun Bao Wansu +1 位作者 Shi Jianhong Li Tan 《China Communications》 SCIE 2024年第6期237-245,共9页
The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions o... The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or assumptions.First,we give two preconditions of applying Grover’s algorithm,which ensure that the success probability of finding the marked element is close to 1.Then,based on these two preconditions,it is found out that the success probability of the quantum algorithm for FXconstruction is far less than 1.Furthermore,we give the design method of the Oracle function,and then present the general method of combining Grover and Simon algorithm for attacking block ciphers,with success probability close to 1. 展开更多
关键词 block ciphers post-quantum crypto quantum algorithms
在线阅读 下载PDF
Insights on Crypto Asset Tax Reporting and Tokenisation of Real-World Assets
16
作者 Peter Brewin 《Belt and Road Initiative Tax Journal》 2024年第1期52-59,共8页
To keep pace with the development of the crypto industry due to its sheer size and complex business models,the Organisation for Economic Co-operation and Development(OECD)introduced the Crypto Asset Reporting Framewor... To keep pace with the development of the crypto industry due to its sheer size and complex business models,the Organisation for Economic Co-operation and Development(OECD)introduced the Crypto Asset Reporting Framework(CARF)to enhance transparency in relevant transactions.It is envisaged that the introduction of CARF will facilitate the exchange of information and potentially lead to increase in tax revenues for those jurisdictions enacting such requirements in due course.In turn,industry players will need to assess the implications this will have in their business from reporting readiness and implementation perspectives.Meanwhile,the tokenisation of real-world assets(RWAs)is gaining momentum.The legal and tax implications that may arise from this latest development can be complex and uncertain. 展开更多
关键词 Tax service Cryptocurrency Digital asset Crypto Asset Reporting Framework Blockchain Distributed ledger Tokenisation
原文传递
Understanding the market potential of crypto mining with quantum mechanics and golden cut-based picture fuzzy rough sets
17
作者 Hasan Dincer Serhat Yüksel +1 位作者 Gabor Pinter Alexey Mikhaylov 《Blockchain(Research and Applications)》 2024年第4期117-125,共9页
Significant improvements should be made to increase the market potential of crypto mining.However,it is not financially feasible to make too many improvements because all actions lead to cost increases.In this context... Significant improvements should be made to increase the market potential of crypto mining.However,it is not financially feasible to make too many improvements because all actions lead to cost increases.In this context,it is necessary to determine the factors that most affect this process.Accordingly,the purpose of this study is to understand the main indicators that can improve the market potential of crypto mining activities.Therefore,the main research question of this study is to identify which factors should be prioritized while generating appropriate strategies to increase these activities.In this context,a new model has been constructed to answer this question.First,significant indicators are identified based on the evaluation of the literature.After that,these factors are weighted via quantum picture fuzzy rough set-based M-SWARA.The main contribution of this study is the generation of a new decision-making model to understand the key issues related to the market potential of crypto mining activities.The M-SWARA model is taken into consideration for criteria weighting.Owing to this issue,the causal relationships between the items can be identified.The findings demonstrate that reducing energy costs emerges as the most important factor for improving the market potential of the crypto mining industry.Furthermore,technological developments also play an important role in this regard. 展开更多
关键词 Decision-making Crypto mining Bitcoin Financial innovation Market potential
原文传递
Respond to the New Accounting Standards,International Taxation Rules and Business Models 被引量:2
18
作者 Stef van Weeghel Jessica Ma 《Belt and Road Initiative Tax Journal》 2023年第1期82-93,共12页
This article discusses some major changes and developments in ac-counting standards(i.e.IFRS 15 and IFRS 16)and international taxation rules(i.e.the Two-Pillar solution under BEPS 2.0)and new business models(i.e.crypt... This article discusses some major changes and developments in ac-counting standards(i.e.IFRS 15 and IFRS 16)and international taxation rules(i.e.the Two-Pillar solution under BEPS 2.0)and new business models(i.e.cryptocurrencies and Non-Fungible Tokens)which may have significant impact on taxpayers and pose challenges to tax administrations on how to provide tax certainty and better taxpayer services.The article briefly analyses the impact of these developments on taxpayers and makes suggestions for tax policymakers and tax administrations in the Belt andwww.britacom.org Road jurisdictions. 展开更多
关键词 Accounting standards BEPS 2.0 Crypto assets
原文传递
HITS hits art
19
作者 Massimo Franceschet 《Blockchain(Research and Applications)》 2021年第4期64-70,共7页
The blockchain art market is partitioned around the roles of artists and collectors and highly concentrated among a few prominent figures.We hence propose to adapt Kleinberg's authority/hub HITS(Hyperlink-Induced ... The blockchain art market is partitioned around the roles of artists and collectors and highly concentrated among a few prominent figures.We hence propose to adapt Kleinberg's authority/hub HITS(Hyperlink-Induced Topic Search)method to rate artists and collectors in the art context.This seems a reasonable choice since the original method deftly defines its scores in terms of a mutual recursive relationship between authorities/artists—the miners of information/art,and hubs/collectors—the assemblers of such information/art.We evaluated the proposed method on the collector-artist network of SuperRare gallery,the major crypto art marketplace.We found that the proposed artist and collector metrics are weakly correlated with other networks science metrics like degree and strength.This hints at the possibility of coupling different measures in order to profile active users of the gallery and suggests investment strategies with different risk/reward ratios for collectors as well as marketing strategies with different targets for artists. 展开更多
关键词 Blockchain Non-fungible tokens Crypto art Network science Centrality measures
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部