simplebooklet thumbnail

I O DIGITAL I O C O I N . I O   I O D I G I TA L . I O  Application Based Blockchain  I O COIN - Ticker  IOC WHITEPAPER
Table of Contents Mission Statement           3  I O Digital Blockchain          5  Problem Statement          6  IOC - DI...
Mission Statement Our ultimate goal is to provide a secure, fast and user friendly Blockchain Ecosystem in order to advanc...
In January 2018, a  5,287,349 USD per day power consumption cost was the estimate given to Bitcoin mining world-wide. Look...
State of the I O Coin Blockchain The importance of I O Coin   s initial fair launch, allowed for a healthy growth period w...
Problem Statement Following in the steps of Satoshi Nakamoto, IOC minted 16 million coins, with a maxcap of 22M to be reac...
IOC - DIONS  Decentralized DNS  The alias key value pairs provide a means of indirection with regard to the naming of IP n...
Users can only use private DIONS for file storage   secure file transfer. Once created a user can pair a particular file o...
Aliases Private Transfer Private aliases are transferable. In order for users to send or receive an alias users would have...
AES 256 Encrypted Messaging Peer to Peer encrypted messages can be sent and received after a channel is established betwee...
Data storage With DIONS there is the option to store encrypted content as referred to earlier. The content is base64 encod...
POS CiPher This is the process for securing the blockchain. Along with the recent implementation and launch of the foregoi...
Channel   Atomic Keys A channel is initiated by means of associating two endpoints with a symmetric encryption key. Channe...
I O DIGITAL Foundation  DIONS V.2 Stealth addresses  In the second quarter stealth addresses will be added to the system. ...
Ring signatures Ring signatures  first introduced by Rivest, Shamir   Tauman in 2001  1   are planned for Q2 in conjunctio...
Group encrypted message channels   auto destroy The current system provides encrypted peer to peer communications. The nex...
Scientific computation One area of interest that we are currently investigating is that of helping to improve understandin...
Graduated staking Along with the desire to promote network security comes the need to recognize nodes with consistent high...
We have been researching and prototyping a mechanism allowing heterogenous networks of entities with different protocols a...
How to use these features We created a fully functional HTML5 electron based wallet system that incorporates all features ...
References  1     How to leak a secret   , Rivest, Shamir, Tauman, ASIACRYPT 2001. Volume 2248 of Lecture Notes in Compute...
I O DIGITAL  I O C O I N . I O   I O D I G I TA L . I O