Towards A Tokenized World: Article Proof of Origin

Our peer review system for research is one of the most precious things we have in academia. It supports the integrity of the peer-review process, and where researchers help refine papers to their best possible level or reject those that are flawed or contribute little. But our existing publishing infrastructure is fairly archaic, and where we still use methods derived from a time of printed paper.

This publication brings together interesting articles related to cyber security.

Recommended from Medium

gRPC Adoption and Working Architecture

Social Friend Relationship System Practice in PostgreSQL — Accelerating Queries of Positive and…

WebUSB — Bridge between USB devices and web browsers

Machine Learning From scratch | Part 3. Matrices and matrices Dot Product

Naive String Searching Algorithm:

What is WebAR or WebXR and Why is it So Exciting — Queppelin

Democratizing Service Automation

Democratize Service automation

Ditch the Double Diamond

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Zero-Knowledge Proofs and Accumulators Using Kryptography and Crypto Pairings

What Happens When The Dealer Leaves The Game: Can We Continue? Meet AVSS

Threshold Ed25519 — It’s Just Magical And Fit For A More Resilient and Trusted World

Towards Larger Public Keys For Key Exchange