2004
DOI: 10.21236/ada424316
|View full text |Cite
|
Sign up to set email alerts
|

Secure Architecture for Extensible Mobile Internet Transport System

Abstract: REPORT DOCUMENTATION PAGE Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…However, the hashing functions are different. According to articles on Investopedia, Bitcoin uses SHA-256, and Litecoin uses Scrypt [6,7]. As a result, the total number of Litecoin is far more than Bitcoin, which is around 84 million [7].…”
Section: Bitcoin Litecoin and Dogecoinmentioning
confidence: 99%
“…However, the hashing functions are different. According to articles on Investopedia, Bitcoin uses SHA-256, and Litecoin uses Scrypt [6,7]. As a result, the total number of Litecoin is far more than Bitcoin, which is around 84 million [7].…”
Section: Bitcoin Litecoin and Dogecoinmentioning
confidence: 99%