Файл: Д. А. Качан, заместитель директора по научной работе.pdf

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 11.12.2023

Просмотров: 56

Скачиваний: 1

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.

ЦИФРОВАЯ ТРАНСФОРМАЦИЯ, № 4 (5), 2018 54
chapter/10.1007/3-540-62494-5_6. – Date of access: 05.12.2018.
15. Van Someren, N. The Practical Problems of Implementing MicroMint / N. Van Someren // 5th International
Conference on Financial Cryptography FC 2001: Lecture Notes in Computer Science, Grand Cayman, 19-22 February
2001 / Springer; ed. P. Syverson. – Berlin, Heidelberg, 2002. – Pp. 41–50. – Mode of access: https://link.springer.com/ch apter/10.1007/3-540-46088-8_3. – Date of access: 05.12.2018.
16. Back, A. Hash cash postage implementation / A. Back // hashcash.org [Electronic resource]. – 1997. – Mode of access: http://www.hashcash.org/papers/announce.txt. – Date of access: 05.12.2018.
17. Back, A. Hashcash - a denial of service counter-measure / A. Back // hashcash.org [Electronic resource]. – 2002. –
Mode of access: http://www.hashcash.org/hashcash.pdf. – Date of access: 05.12.2018.
18. Энергетика. Баланс электрической энергии // Национальный статистический комитет Республи-ки Беларусь
[Электронный ресурс]. – 2018. – Режим доступа: http://www.belstat.gov.by/upload-belstat/upload-belstat-excel/
Oficial_statistika/year-ru-energy-2018-01.xlsx. – Дата доступа: 05.12.2018.
19. Fenn, J. Mastering the Hype Cycle: How to Choose the Right Innovation at the Right Time / J. Fenn, M. Raskino //
Gartner, Inc. – Harvard Business Press, 2008. – P. 67. – Mode of access: https://books.google.by/books/about/Mastering_
the_Hype_Cycle.html?id=hOBMBmcmROAC&redir_esc=y. – Date of access: 05.12.2018.
References
1. Top 10 Emerging Technologies of 2016. Global Agenda: World Economic Forum. Geneva, 2016. Available at: http://
www3.weforum.org/docs/GAC16_Top10_Emerging_Technologies_2016_report.pdf (accessed: 05.12.2018).
2. Vishnjakov V. The use of intelligent and blockchain technologies in information management. Sistemnyj analiz i prikladnaja informatika [System analysis and applied informatics], 2018, no. 1. Available at: https://cyberleninka.ru/
article/n/ispolzovanie-intellektualnyh-i-blokcheyn-tehnologiy-v-informatsionnom-upravlenii. (accessed: 05.12.2018)
(in Russian).
3. O normativnyh pravovyh aktah Respubliki Belarus': Dekret Prezidenta Respubliki Belarus' ot 21 dekabrja 2017 g.
№ 8: s prilozh: tekst po sostojaniju na 05 dekabrja 2018 g. [On normative legal acts of the Republic of Belarus: Decree of the President of the Republic of Belarus of December 21, 2017 No. 8: s appended: text as of December 5, 2018].
Available at: http://president.gov.by/ru/official_documents_ru/view/dekret-8-ot-21-dekabrja-2017-g-17716/ (accessed:
05.12.2018) (in Russian).
4. Timothy C. May The Crypto Anarchist Manifesto. Available at: https://www.activism.net/cypherpunk/crypto-anarchy.
html (accessed: 05.12.2018) (in Russian).
5. Lipton R. J., Ostrovsky R. Micro-payments via efficient coin-flipping. International Conference on Financial Cryptography and Data Security: Lecture Notes in Computer Science, Anguilla, 23–25 February, 1998. Berlin: Heidelberg, 1998. Vol. 1465.
Available at: https://link.springer.com/chapter/10.1007/BFb0055469 (accessed: 05.12.2018).
6. Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available at: https://bitcoin.org/bitcoin.pdf
(accessed: 05.12.2018).
7. Chaum D., Fiat A., Naor M. Untraceable Electronic Cash. Conference Advances in Cryptology – CRYP-TO’ 88:
Lecture Notes in Computer Science. New York, 1988, pp. 319–327. Available at: https://link.springer.com/chapt er/10.1007/0-387-34799-2_25 (accessed: 05.12.2018).
8. Massias H., Avila X. S., Quisquater J. J. Design of a secure timestamping service with minimal trust require-ments.
20th Symposium on Information Theory in the Benelux, May, 1999, pp. 79–86. Available at: https://uclouvain.be/crypto/
services/download/publications.pdf.9ca0971b29e9c614.7064663131332e706466.pdf (accessed: 05.12.2018).
9. Haber S., Stornetta W. S. How to time-stamp a digital document. Journal of Cryptology. 1991, vol. 3, issue 2, pp. 99–
111. Available at: https://link.springer.com/article/10.1007/BF00196791 (accessed: 05.12.2018).
10. Bayer D., Haber S., Stornetta W. S. Improving the efficiency and reliability of digital time-stamping. Se-quences
II Methods in Communication, Security and Computer Science. New York, 1993, pp. 329–334. Available at: https://link.
springer.com/chapter/10.1007/978-1-4613-9323-8_24 (accessed: 05.12.2018).
11. Haber S., Stornetta W. S. Secure names for bit-strings. Proceedings of the 4th ACM conference on Com-puter and communications security, Zurich, 1–4 April, 1997. New York, 1997, pp. 28–35. Available at: https://dl.acm.org/citation.
cfm?doid=266420.266430 (accessed: 05.12.2018).
12. Lamport L., Shostak R., Pease M. The Byzantine Generals Problem. ACM Transactions on Programming Languages and
Systems (TOPLAS), 1982, vol. 4, issue 3, pp. 382–401. Available at: https://dl.acm.org/citation.cfm?id=357176 (accessed:
05.12.2018).
13. Dwork C., Naor M. Pricing via Processing or Combatting Junk Mail. Conference Advances in Cryptology – CRYPTO’ 92:
Lecture Notes in Computer Science, Santa Barbara, 16-20 August 1992. Berlin: Heidelberg, 1992, pp. 139–147. Available at: https://link.springer.com/chapter/10.1007/3-540-48071-4_10 (accessed: 05.12.2018).
14. Rivest R. L., Shamir A. PayWord and MicroMint: two simple micropayment schemes. Security Protocols: International
Workshop on Security Protocols: Lecture Notes in Computer Science, Cambridge, 10-12 April 1996. Berlin: Heidelberg,
1996, pp. 69–87. Available at: https://link.springer.com/chapter/10.1007/3-540-62494-5_6 (accessed: 05.12.2018).


DIGITAL TRANSFORMATION, No 4 (5), 2018 55 15. Van Someren N. The Practical Problems of Implementing MicroMint. 5th International Conference on Fi-nancial
Cryptography FC 2001: Lecture Notes in Computer Science, Grand Cayman, 19-22 February 2001. Berlin: Heidelberg,
2002, pp. 41–50. Available at: https://link.springer.com/chapter/10.1007/3-540-46088-8_3 (accessed: 05.12.2018).
16. Back A. Hash cash postage implementation. Available at: http://www.hashcash.org/papers/announce.txt (accessed:
05.12.2018).
17. Back A. Hashcash — a denial of service counter-measure. Available at: http://www.hashcash.org/hashcash.pdf
(accessed: 05.12.2018).
18. Jenergetika. Balans jelektricheskoj jenergii [Energy. Electric power balance]. Available at: http://www.belstat.gov.by/
upload-belstat/upload-belstat-excel/Oficial_statistika/year-ru-energy-2018-01.xlsx (accessed: 05.12.2018) (in Russian).
19. Fenn J., Raskin M. Mastering the Hype Cycle: How to Choose the Right Innovation at the Right Time. Harvard
Business Press, 2008, p. 67. Available at: https://books.google.by/books/about/Mastering_the_Hype_Cycle.
html?id=hOBMBmcmROAC&redir_esc=y (accessed: 05.12.2018).
Received: 19.12.2018 Поступила: 19.12.2018