Results 1 to 10 of about 292,179 (308)
Indoor location‐based services have numerous applications built on indoor navigation. Over the years, researchers have proposed various indoor navigation methods to find a certain point of interest.
Changxin Yang +4 more
doaj +1 more source
Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain [PDF]
Many cryptocurrencies rely on Blockchain for its operation. Blockchain serves as a public ledger where all the completed transactions can be looked up. To place transactions in the Blockchain, a mining operation must be performed.
Jo, Ju-Yeon, Kim, Yoohwan
core +3 more sources
Full Text PDF of The JBBA, 11th Issue, May 2023
Full Text PDF of The JBBA, 11th Issue, May ...
The British Blockchain Association
doaj
We apply institutional cryptoeconomics to the information problems in global trade, model the incentives under which blockchain-based supply chain infrastructure will be built, and make predictions about the future of supply chains.
Darcy W. E. Allen +2 more
doaj +1 more source
A Digital Currency Architecture for Privacy and Owner-Custodianship
In recent years, electronic retail payment mechanisms, especially e-commerce and card payments at the point of sale, have increasingly replaced cash in many developed countries.
Geoffrey Goodell +2 more
doaj +1 more source
Full Text PDF of Volume 6, Issue 2, of The JBBA, Nov 2023
Full Text PDF of Volume 6, Issue 2, of The JBBA, Nov ...
The British Blockchain Association
doaj
A Review of the Key Technology in a Blockchain Building Decentralized Trust Platform
Currently, the trust mechanisms of various Internet application platforms are still built under the orders of centralized authorities. This centralized trust mechanism generally suffers from problems such as excessive power of central nodes, single point
Weichu Deng, Teng Huang, Haiyang Wang
doaj +1 more source
Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M. +4 more
core +2 more sources
Full Text PDF of The JBBA, Vol 5 Issue 2, November 2022
Full Text PDF of The JBBA, Vol 5 Issue 2, November 2022.
The British Blockchain Association
doaj
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun +3 more
doaj +1 more source

