ºÝºÝߣshows by User: WenboMao / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: WenboMao / Tue, 25 Jun 2019 08:35:05 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: WenboMao DaoLiName£­Decentralized Identity as Public Key /slideshow/daolinamedecentralized-identity-as-public-key/151718586 daolinamewp-190625083505
We present DaoLiName (µÀÁ¢Ãû, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key. ]]>

We present DaoLiName (µÀÁ¢Ãû, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key. ]]>
Tue, 25 Jun 2019 08:35:05 GMT /slideshow/daolinamedecentralized-identity-as-public-key/151718586 WenboMao@slideshare.net(WenboMao) DaoLiName£­Decentralized Identity as Public Key WenboMao We present DaoLiName (µÀÁ¢Ãû, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/daolinamewp-190625083505-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We present DaoLiName (µÀÁ¢Ãû, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key.
DaoLiName?Decentralized Identity as Public Key from DaoliCloud Ltd
]]>
171 3 https://cdn.slidesharecdn.com/ss_thumbnails/daolinamewp-190625083505-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DaoliNameCoin -- A Uniquely Novel Blockchain Squared Zooko's Triangle /slideshow/daolinamecoin-a-uniquely-novel-blockchain-squared-zookos-triangle/148972118 daolinamecoin-190606083058
Keep tuned for DaoliNameCoin, a uniquely novel blockchain using bilinear pairing crypto technique and combination of PoW + PoS for authentication of Identity Based Cryptography]]>

Keep tuned for DaoliNameCoin, a uniquely novel blockchain using bilinear pairing crypto technique and combination of PoW + PoS for authentication of Identity Based Cryptography]]>
Thu, 06 Jun 2019 08:30:58 GMT /slideshow/daolinamecoin-a-uniquely-novel-blockchain-squared-zookos-triangle/148972118 WenboMao@slideshare.net(WenboMao) DaoliNameCoin -- A Uniquely Novel Blockchain Squared Zooko's Triangle WenboMao Keep tuned for DaoliNameCoin, a uniquely novel blockchain using bilinear pairing crypto technique and combination of PoW + PoS for authentication of Identity Based Cryptography <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/daolinamecoin-190606083058-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Keep tuned for DaoliNameCoin, a uniquely novel blockchain using bilinear pairing crypto technique and combination of PoW + PoS for authentication of Identity Based Cryptography
DaoliNameCoin -- A Uniquely Novel Blockchain Squared Zooko's Triangle from DaoliCloud Ltd
]]>
151 1 https://cdn.slidesharecdn.com/ss_thumbnails/daolinamecoin-190606083058-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts /slideshow/squaring-zookos-triangle-blockchain-authentication-for-smart-dusts/148140403 idpkeng-190529151000
Zooko's Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography.]]>

Zooko's Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography.]]>
Wed, 29 May 2019 15:09:59 GMT /slideshow/squaring-zookos-triangle-blockchain-authentication-for-smart-dusts/148140403 WenboMao@slideshare.net(WenboMao) Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts WenboMao Zooko's Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/idpkeng-190529151000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Zooko&#39;s Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography.
Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts from DaoliCloud Ltd
]]>
183 1 https://cdn.slidesharecdn.com/ss_thumbnails/idpkeng-190529151000-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Blockchain ibc eng /slideshow/blockchain-ibc-eng/147213965 blockchainibceng-190523040644
Blockchain authentication for smart dusts, client devices, smart phones, etc]]>

Blockchain authentication for smart dusts, client devices, smart phones, etc]]>
Thu, 23 May 2019 04:06:43 GMT /slideshow/blockchain-ibc-eng/147213965 WenboMao@slideshare.net(WenboMao) Blockchain ibc eng WenboMao Blockchain authentication for smart dusts, client devices, smart phones, etc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blockchainibceng-190523040644-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Blockchain authentication for smart dusts, client devices, smart phones, etc
Blockchain ibc eng from DaoliCloud Ltd
]]>
161 1 https://cdn.slidesharecdn.com/ss_thumbnails/blockchainibceng-190523040644-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DaoliName Key Management Solution /slideshow/daoliname-key-management-solution/134055146 daolinamedustreg-190302060544
Identity Based Crypto (IBC): Any bit string can be used as public key! However, since its inception long long ago, cryptographers have been proud of its other property: non-interaction. That proud has a cost: user's private key has to be issued by an authentication authority. This inherent key-escrow disadvantage prevented IBC from commercial applications. Today, everybody is interacting with each other. We propose "IBC", an interactive version of IBC, to have the inherent key escrow weakness completely eliminated from the infrastructure. Then, like Domain Name Service, DNS, a user who wants crypto capability can register its public key bitstring for others to query. The result is streamlined key management as simple as DNS.]]>

Identity Based Crypto (IBC): Any bit string can be used as public key! However, since its inception long long ago, cryptographers have been proud of its other property: non-interaction. That proud has a cost: user's private key has to be issued by an authentication authority. This inherent key-escrow disadvantage prevented IBC from commercial applications. Today, everybody is interacting with each other. We propose "IBC", an interactive version of IBC, to have the inherent key escrow weakness completely eliminated from the infrastructure. Then, like Domain Name Service, DNS, a user who wants crypto capability can register its public key bitstring for others to query. The result is streamlined key management as simple as DNS.]]>
Sat, 02 Mar 2019 06:05:44 GMT /slideshow/daoliname-key-management-solution/134055146 WenboMao@slideshare.net(WenboMao) DaoliName Key Management Solution WenboMao Identity Based Crypto (IBC): Any bit string can be used as public key! However, since its inception long long ago, cryptographers have been proud of its other property: non-interaction. That proud has a cost: user's private key has to be issued by an authentication authority. This inherent key-escrow disadvantage prevented IBC from commercial applications. Today, everybody is interacting with each other. We propose "IBC", an interactive version of IBC, to have the inherent key escrow weakness completely eliminated from the infrastructure. Then, like Domain Name Service, DNS, a user who wants crypto capability can register its public key bitstring for others to query. The result is streamlined key management as simple as DNS. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/daolinamedustreg-190302060544-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Identity Based Crypto (IBC): Any bit string can be used as public key! However, since its inception long long ago, cryptographers have been proud of its other property: non-interaction. That proud has a cost: user&#39;s private key has to be issued by an authentication authority. This inherent key-escrow disadvantage prevented IBC from commercial applications. Today, everybody is interacting with each other. We propose &quot;IBC&quot;, an interactive version of IBC, to have the inherent key escrow weakness completely eliminated from the infrastructure. Then, like Domain Name Service, DNS, a user who wants crypto capability can register its public key bitstring for others to query. The result is streamlined key management as simple as DNS.
DaoliName Key Management Solution from DaoliCloud Ltd
]]>
159 2 https://cdn.slidesharecdn.com/ss_thumbnails/daolinamedustreg-190302060544-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Novel Use of Openflow and Its Applications in Connecting Docker and Dummifying Cloud (Build, Ship, Run any CLOUD, any SCALE) /WenboMao/openflow-raic-english openflowraic-english-150423225343-conversion-gate02
Lift Version of this Deck: When the lift is going up: Deployment and operation maintenance of cloud operating systems, e.g., Openstack, from now on become plug-n-play easy for ¡°dummies¡± When the lift is going down: What? Docker is not connected? Don¡¯t you know Docker is for the cloud? Don¡¯t you know cloud needs a controller? No? You¡¯re finished! Yes? Read on!]]>

Lift Version of this Deck: When the lift is going up: Deployment and operation maintenance of cloud operating systems, e.g., Openstack, from now on become plug-n-play easy for ¡°dummies¡± When the lift is going down: What? Docker is not connected? Don¡¯t you know Docker is for the cloud? Don¡¯t you know cloud needs a controller? No? You¡¯re finished! Yes? Read on!]]>
Thu, 23 Apr 2015 22:53:43 GMT /WenboMao/openflow-raic-english WenboMao@slideshare.net(WenboMao) A Novel Use of Openflow and Its Applications in Connecting Docker and Dummifying Cloud (Build, Ship, Run any CLOUD, any SCALE) WenboMao Lift Version of this Deck: When the lift is going up: Deployment and operation maintenance of cloud operating systems, e.g., Openstack, from now on become plug-n-play easy for ¡°dummies¡± When the lift is going down: What? Docker is not connected? Don¡¯t you know Docker is for the cloud? Don¡¯t you know cloud needs a controller? No? You¡¯re finished! Yes? Read on! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/openflowraic-english-150423225343-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Lift Version of this Deck: When the lift is going up: Deployment and operation maintenance of cloud operating systems, e.g., Openstack, from now on become plug-n-play easy for ¡°dummies¡± When the lift is going down: What? Docker is not connected? Don¡¯t you know Docker is for the cloud? Don¡¯t you know cloud needs a controller? No? You¡¯re finished! Yes? Read on!
A Novel Use of Openflow and Its Applications in Connecting Docker and Dummifying Cloud (Build, Ship, Run any CLOUD, any SCALE) from DaoliCloud Ltd
]]>
500 3 https://cdn.slidesharecdn.com/ss_thumbnails/openflowraic-english-150423225343-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Openflow for Cloud Scalability /slideshow/open-flowforscalability/42423704 6hutiwfoqxckyczpms2e-signature-0a1e54252d7d23fac3e24f21dd3b76d2592e16a4a1be7a0849b3240efa260863-poli-141206094605-conversion-gate02
Challenge: Recent success of Docker containers reveals arrival of a new era: the number of CPUs is exploding 10-100 folds up, and cloud networking is already in a new movement of scalability upgrade Question: To scale UP or OUT? I.e., UPgrade or OUTgrade? Answer from DaoliCloud¡¯s practice: Better scale OUT, ,,.and Openflow can help]]>

Challenge: Recent success of Docker containers reveals arrival of a new era: the number of CPUs is exploding 10-100 folds up, and cloud networking is already in a new movement of scalability upgrade Question: To scale UP or OUT? I.e., UPgrade or OUTgrade? Answer from DaoliCloud¡¯s practice: Better scale OUT, ,,.and Openflow can help]]>
Sat, 06 Dec 2014 09:46:05 GMT /slideshow/open-flowforscalability/42423704 WenboMao@slideshare.net(WenboMao) Openflow for Cloud Scalability WenboMao Challenge: Recent success of Docker containers reveals arrival of a new era: the number of CPUs is exploding 10-100 folds up, and cloud networking is already in a new movement of scalability upgrade Question: To scale UP or OUT? I.e., UPgrade or OUTgrade? Answer from DaoliCloud¡¯s practice: Better scale OUT, ,,.and Openflow can help <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6hutiwfoqxckyczpms2e-signature-0a1e54252d7d23fac3e24f21dd3b76d2592e16a4a1be7a0849b3240efa260863-poli-141206094605-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Challenge: Recent success of Docker containers reveals arrival of a new era: the number of CPUs is exploding 10-100 folds up, and cloud networking is already in a new movement of scalability upgrade Question: To scale UP or OUT? I.e., UPgrade or OUTgrade? Answer from DaoliCloud¡¯s practice: Better scale OUT, ,,.and Openflow can help
Openflow for Cloud Scalability from DaoliCloud Ltd
]]>
513 1 https://cdn.slidesharecdn.com/ss_thumbnails/6hutiwfoqxckyczpms2e-signature-0a1e54252d7d23fac3e24f21dd3b76d2592e16a4a1be7a0849b3240efa260863-poli-141206094605-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From IaaS to PaaS to Docker Networking to ¡­ Cloud Networking Scalability /slideshow/nvi-42085431/42085431 nxnff1cmqz2gfntjeqge-signature-7e9691b03eb0efdc555890165d5d9195ce9741ba39d2ef1c21d9bcd666c967bb-poli-141127035652-conversion-gate02
This whitepaper presents DaoliCloud¡¯s Network Virtualization Infrastructure (NVI) technology as a scalable cloud networking solution. It reasons about why and how the NVI technology is suitable for offering online IaaS and PaaS businesses of arbitrary scalability and elasticity. In order to analyze cloud networking scalability problem, the whitepaper also provides a technology survey on existing IaaS and PaaS networking offerings.]]>

This whitepaper presents DaoliCloud¡¯s Network Virtualization Infrastructure (NVI) technology as a scalable cloud networking solution. It reasons about why and how the NVI technology is suitable for offering online IaaS and PaaS businesses of arbitrary scalability and elasticity. In order to analyze cloud networking scalability problem, the whitepaper also provides a technology survey on existing IaaS and PaaS networking offerings.]]>
Thu, 27 Nov 2014 03:56:52 GMT /slideshow/nvi-42085431/42085431 WenboMao@slideshare.net(WenboMao) From IaaS to PaaS to Docker Networking to ¡­ Cloud Networking Scalability WenboMao This whitepaper presents DaoliCloud¡¯s Network Virtualization Infrastructure (NVI) technology as a scalable cloud networking solution. It reasons about why and how the NVI technology is suitable for offering online IaaS and PaaS businesses of arbitrary scalability and elasticity. In order to analyze cloud networking scalability problem, the whitepaper also provides a technology survey on existing IaaS and PaaS networking offerings. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nxnff1cmqz2gfntjeqge-signature-7e9691b03eb0efdc555890165d5d9195ce9741ba39d2ef1c21d9bcd666c967bb-poli-141127035652-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This whitepaper presents DaoliCloud¡¯s Network Virtualization Infrastructure (NVI) technology as a scalable cloud networking solution. It reasons about why and how the NVI technology is suitable for offering online IaaS and PaaS businesses of arbitrary scalability and elasticity. In order to analyze cloud networking scalability problem, the whitepaper also provides a technology survey on existing IaaS and PaaS networking offerings.
From IaaS to PaaS to Docker Networking to ¡­ Cloud Networking Scalability from DaoliCloud Ltd
]]>
655 1 https://cdn.slidesharecdn.com/ss_thumbnails/nxnff1cmqz2gfntjeqge-signature-7e9691b03eb0efdc555890165d5d9195ce9741ba39d2ef1c21d9bcd666c967bb-poli-141127035652-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
One Variable to Control Them All for Openflow (and Application in Docker Networking) /slideshow/one-variable-to-controlthemall/41051706 dxgwasqorwuvq2sd3wfq-signature-eb35399385570f6104b3acaa1ec37331e23bd054c343b864245936e1e2e86c30-poli-141103080818-conversion-gate01
"One Variable to Control Them All", a novel formulation of using Openflow, to achieve Network Virtualization, SDN, Network Function Virtualization, Service Chain QoS. An application in Docker networking is demo shown in www.daolicloud.com]]>

"One Variable to Control Them All", a novel formulation of using Openflow, to achieve Network Virtualization, SDN, Network Function Virtualization, Service Chain QoS. An application in Docker networking is demo shown in www.daolicloud.com]]>
Mon, 03 Nov 2014 08:08:18 GMT /slideshow/one-variable-to-controlthemall/41051706 WenboMao@slideshare.net(WenboMao) One Variable to Control Them All for Openflow (and Application in Docker Networking) WenboMao "One Variable to Control Them All", a novel formulation of using Openflow, to achieve Network Virtualization, SDN, Network Function Virtualization, Service Chain QoS. An application in Docker networking is demo shown in www.daolicloud.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dxgwasqorwuvq2sd3wfq-signature-eb35399385570f6104b3acaa1ec37331e23bd054c343b864245936e1e2e86c30-poli-141103080818-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> &quot;One Variable to Control Them All&quot;, a novel formulation of using Openflow, to achieve Network Virtualization, SDN, Network Function Virtualization, Service Chain QoS. An application in Docker networking is demo shown in www.daolicloud.com
One Variable to Control Them All for Openflow (and Application in Docker Networking) from DaoliCloud Ltd
]]>
347 3 https://cdn.slidesharecdn.com/ss_thumbnails/dxgwasqorwuvq2sd3wfq-signature-eb35399385570f6104b3acaa1ec37331e23bd054c343b864245936e1e2e86c30-poli-141103080818-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Connecting Docker for Cloud IaaS (Speech at CSDN-Oct18 /slideshow/daoli-cloud-csdnoct18-40482412/40482412 p5j3pniqsr1d9c6sqdyi-signature-7046ed091e4452bff5ae92cb39fc70561c24d24c76430e43285f563847f4dcf3-poli-141020054020-conversion-gate02
SDN and network virtualization connecting Docker containers to provide truly large scale and elastic cloud IaaS services. By eliminating network boundaries among Docker hosts, worldwide distributed containers over Docker orchestrators can be connected in Tenant SDN Controller (TSC). Docker platform's network thus become virtualized so that this great platform now no longer has to be limited to PaaS use (unlike IaaS use, PaaS uses are user specific and hence do not demand scalability.)]]>

SDN and network virtualization connecting Docker containers to provide truly large scale and elastic cloud IaaS services. By eliminating network boundaries among Docker hosts, worldwide distributed containers over Docker orchestrators can be connected in Tenant SDN Controller (TSC). Docker platform's network thus become virtualized so that this great platform now no longer has to be limited to PaaS use (unlike IaaS use, PaaS uses are user specific and hence do not demand scalability.)]]>
Mon, 20 Oct 2014 05:40:20 GMT /slideshow/daoli-cloud-csdnoct18-40482412/40482412 WenboMao@slideshare.net(WenboMao) Connecting Docker for Cloud IaaS (Speech at CSDN-Oct18 WenboMao SDN and network virtualization connecting Docker containers to provide truly large scale and elastic cloud IaaS services. By eliminating network boundaries among Docker hosts, worldwide distributed containers over Docker orchestrators can be connected in Tenant SDN Controller (TSC). Docker platform's network thus become virtualized so that this great platform now no longer has to be limited to PaaS use (unlike IaaS use, PaaS uses are user specific and hence do not demand scalability.) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p5j3pniqsr1d9c6sqdyi-signature-7046ed091e4452bff5ae92cb39fc70561c24d24c76430e43285f563847f4dcf3-poli-141020054020-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SDN and network virtualization connecting Docker containers to provide truly large scale and elastic cloud IaaS services. By eliminating network boundaries among Docker hosts, worldwide distributed containers over Docker orchestrators can be connected in Tenant SDN Controller (TSC). Docker platform&#39;s network thus become virtualized so that this great platform now no longer has to be limited to PaaS use (unlike IaaS use, PaaS uses are user specific and hence do not demand scalability.)
Connecting Docker for Cloud IaaS (Speech at CSDN-Oct18 from DaoliCloud Ltd
]]>
408 4 https://cdn.slidesharecdn.com/ss_thumbnails/p5j3pniqsr1d9c6sqdyi-signature-7046ed091e4452bff5ae92cb39fc70561c24d24c76430e43285f563847f4dcf3-poli-141020054020-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-WenboMao-48x48.jpg?cb=1558584377 The DaoliCloud Limited is a startup working on technology solutions to add trust and security to cloud computing and cloud storage. nvi.daolicloud.com https://cdn.slidesharecdn.com/ss_thumbnails/daolinamewp-190625083505-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/daolinamedecentralized-identity-as-public-key/151718586 ¶Ù²¹´Ç³¢¾±±·²¹³¾±ð£­¶Ù±ð³¦±ð²Ô³Ù°ù²¹±ô¾±³ú±ð... https://cdn.slidesharecdn.com/ss_thumbnails/daolinamecoin-190606083058-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/daolinamecoin-a-uniquely-novel-blockchain-squared-zookos-triangle/148972118 DaoliNameCoin -- A Uni... https://cdn.slidesharecdn.com/ss_thumbnails/idpkeng-190529151000-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/squaring-zookos-triangle-blockchain-authentication-for-smart-dusts/148140403 Squaring Zooko&#39;s Trian...