Articles about Blockchain - Section 19
Zou Chuanwei: The logic and mechanism of the blockchain applied in the post-processing of financial transactions
The central bank's digital currency and the global stable currency represented by Libra reflect the application ...
How does Ruixing's employees commit fraud of 2.2 billion, and how to use technology to prevent financial fraud?
Text | Edit by Derek | Produced by Bi Tongtong | PANews Ruixing Coffee's "self-defense financial fraud"...
Global blockchain status: Asia is the most competitive, and Africa is the largest target market?
Author: Joseph Birch Translator: Sambodhi Source: Blockchain Outpost Globally, the adoption of blockchain technology ...
Yao Qian: Three major scenarios and solutions in which blockchain may be applied to central bank digital currency
Source of this article: First Financial , original title "Yao Qian: Blockchain and Central Bank Digital Currency...
Observation | Xiong'an Blockchain's 3rd Anniversary: From the first tree with an "identity card" to the official opening of the blockchain laboratory
On March 31, the day before the third anniversary of the establishment of the Xiong'an New District, the Xiong&a...
Video | Chen Xiaohua: Two attributes, six dimensions, and one center of the blockchain
What is blockchain? What is the development stage and future prospects of the blockchain? What can it bring us? These...
The application prospect of blockchain technology in sudden public safety incidents: how to realize "digital city governance" and "digital epidemic prevention"?
Source: National Governance Weekly Editor's Note: The original title was "The Application Prospect of Block...
Fragmented identity data, reshaped on the blockchain
"Identity" is the most basic information for everyone. When it comes to identity, the majority of people ha...
Inventory of China's four major trade areas: what has the blockchain "horse enclosure" done over the years?
Today ’s article is a summary and summary of the four very important trade zones divided by China, namely Xion...
Technology Sharing | Synergy between Cryptography, Blockchain and Privacy Computing
Hashing theory No privacy, no insurance? Privacy computing constitutes a moat that users trust, and the hero behind p...
- You may be interested
- LianGuai Daily | HTX hot wallet was sto...
- Viewpoint | Libra on Facebook, why is t...
- Gemini co-founder angrily accuses DCG f...
- "Bitcoin will rise to $380,000&quo...
- QKL123 market analysis | long and short...
- DEXTools Delivers the Top Crypto Winner...
- Bankless: The Prosperity and Challenges...
- ETHGlobal New York Hackathon 13 Winning...
- Market Analysis: Once again, the BTC Ai...
- Quick look at a16z’s new SNARK-ba...
- Casio will release virtual G-SHOCK NFT ...
- Breaking News: Andreessen Horowitz Plan...
- European bank officials discuss the pot...
- A Plustoken falls, and there are thousa...
- 喵 区 Block Chain 26 | The ...
Find your business way
Globalization of Business, We can all achieve our own Success.