๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Distributed Hash

Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing

Efficient Byzantine Consensus MechanismBased on Reputation in IoT Blockchain
arxiv.orgยท15h
๐ŸคConsensus Algorithms
Building highly available services: global anycast PowerDNS cluster
quantum5.caยท1d
๐ŸŒDNS Security
Indexing Blockchain Events with Rust and Alloy
blog.bilinearlabs.ioยท21hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Nakamoto Consensus from Multiple Resources
arxiv.orgยท15h
๐ŸคDistributed Consensus
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท1d
โš—๏ธAlgebraic Coding
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.comยท8h
๐ŸŽฏThreat Hunting
Wow. Bitcoin is almost $1,500
forums.anandtech.comยท19h
๐Ÿ”—Hash Chains
Decent Patterns
decentpatterns.comยท19h
๐Ÿ“‹Format Specification
Reducing double spend latency from 40 ms to < 1 ms on privacy proxy
blog.cloudflare.comยท6h
๐ŸŒDNS over QUIC
In Cybersecurity, We Have to Work Together
tenable.comยท9h
๐Ÿ”“Hacking
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.comยท17hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Real Life Is Uncertain. Consensus Should Be Too
muratbuffalo.blogspot.comยท6hยท
Discuss: Hacker News
๐ŸคPaxos Consensus
SIEVE โ€” a better algorithm than LRU?
blog.apnic.netยท14h
๐Ÿ’จCache Analysis
(BT) Diversity from (LC) Diversity
golem.ph.utexas.eduยท2h
๐ŸงฎKolmogorov Complexity
A ton of IPv6 innovations in AWS
blog.james.rcpt.toยท16h
๐ŸŒIPFS
Quantum framework offers new approach to analyzing complex network data
phys.orgยท1d
โš›๏ธQuantum Circuits
Digital Fraud in the Jewellery Business โ€” How Hackers Are Misusing Trusted Jewellery Brands?
infosecwriteups.comยท10h
๐ŸšจIncident Response
Where Matters: Location Feature Engineering for Search &amp; Recs
shaped.aiยท1d
๐Ÿ“Range Queries
How the Lean language brings math to coding and coding to math
amazon.scienceยท1hยท
Discuss: Hacker News
๐Ÿ”ฌLean
How to detect Tor traffic & block high-risk anonymity networks
fingerprint.comยท3h
๐Ÿง…Tor Networks
Loading...Loading more...
AboutBlogChangelogRoadmap