PinnedMajor Improvement of Initial Block Download (IBD)When a Bitcoin node joins the network, it must synchronize with network by downloading the entire block chain (which is roughly 550…Mar 7Mar 7
Simulation, Indistinguishability, and the Necessity of PKIFLM Impossibility ResultOct 4, 2022Oct 4, 2022
Byzantine Broadcast in Dolev-Strong ProtocolIn this article, we study a classic result from 1983 by D.Dolev and H.Strong on reaching an agreement in a distributed system between a set…Sep 7, 2022Sep 7, 2022
Why Bitcoin is the most advanced Form of Money ?100 years ago most people would pay for their house, education, or marriage from their own labor or accumulated savings, such a notion…Aug 10, 20221Aug 10, 20221
Understanding OAuth2.0, OpenId (authentication) using Cognito in AngularHere i will share with you the process to set up authorization, authentication for your application using AWS Cognito. AWS Cognito let’s…Sep 2, 20201Sep 2, 20201
Deploy your application with EC2, Docker, Spring boot using AWS CLIIn this tutorial, i will show you step by step how to create a docker image of your spring boot project and deploy it on an EC2 instance…Mar 8, 20206Mar 8, 20206