Hyperledger Fabric 2.2.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 848 页 | 11.56 MB | 1 年前3
Hyperledger Fabric 2.0.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 760 页 | 10.21 MB | 1 年前3
Hyperledger Fabric 2.2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 820 页 | 10.90 MB | 1 年前3
Hyperledger Fabric 2.1.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 816 页 | 10.25 MB | 1 年前3
Hyperledger Fabric 2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 821 页 | 10.22 MB | 1 年前3
Hyperledger Fabric 2.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 904 页 | 10.95 MB | 1 年前3
Hyperledger Fabric 1.1 Documentationdecentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified transactions synchronized across the network – to ensure that ledgers update only when transactions are approved by the appropriate participants, and that when ledgers do update, they update with the same transactions Bitcoin, ordering happens through a process called mining where competing computers race to solve a cryptographic puzzle which defines the order that all processes subsequently build upon. Hyperledger Fabric0 码力 | 422 页 | 4.84 MB | 1 年前3
FISCO BCOS 2.3.0 中文文档BCOS的账户地址与以太坊兼容。 注意keccak-256sum与SHA3不相同,详情参 考这里 [https://ethereum.stackexchange.com/questions/550/which-cryptographic-hash-function-does- ethereum-use]。 以太坊地址生成 [https://kobl.one/blog/create-full-ethereum-keypair-and-address/] the difference between the national cryptographic version and the normal version? A: The national cryptography version FISCO BCOS replaces the cryptographic algorithms of underlying modules such as transaction optimizations on overall architecture and transaction processing. 1.0 version uses efficient consensus algorithms, parallelizing computing. Furthermore, the core breakthrough of its performance is not only in0 码力 | 1227 页 | 10.79 MB | 1 年前3
FISCO BCOS 2.1.0 中文文档BCOS的账户地址与以太坊兼容。 注意keccak-256sum与SHA3不相同,详情参 考这里 [https://ethereum.stackexchange.com/questions/550/which-cryptographic-hash-function-does- ethereum-use]。 以太坊地址生成 [https://kobl.one/blog/create-full-ethereum-keypair-and-address/] the difference between the national cryptographic version and the normal version? A: The national cryptography version FISCO BCOS replaces the cryptographic algorithms of underlying modules such as transaction optimizations on overall architecture and transaction processing. 1.0 version uses efficient consensus algorithms, parallelizing computing. Furthermore, the core breakthrough of its performance is not only in0 码力 | 1058 页 | 740.85 KB | 1 年前3
FISCO BCOS 2.2.0 中文文档BCOS的账户地址与以太坊兼容。 注意keccak-256sum与SHA3不相同,详情参 考这里 [https://ethereum.stackexchange.com/questions/550/which-cryptographic-hash-function-does- ethereum-use]。 以太坊地址生成 [https://kobl.one/blog/create-full-ethereum-keypair-and-address/] the difference between the national cryptographic version and the normal version? A: The national cryptography version FISCO BCOS replaces the cryptographic algorithms of underlying modules such as transaction optimizations on overall architecture and transaction processing. 1.0 version uses efficient consensus algorithms, parallelizing computing. Furthermore, the core breakthrough of its performance is not only in0 码力 | 1156 页 | 10.03 MB | 1 年前3
共 327 条
- 1
- 2
- 3
- 4
- 5
- 6
- 33













