Results 91 to 100 of about 311,882 (281)

Blockchain in a Nutshell

open access: yes, 2022
Pre-print. Book chapter (50 pages) in "Handbook on Blockchain". Duc A. Tran, My T. Thai, and Bhaskar Krishnamachari (eds).
Tran, Duc A., Krishnamachari, Bhaskar
openaire   +2 more sources

When Blockchain Meets SGX: An Overview, Challenges, and Open Issues

open access: yesIEEE Access, 2020
As a decentralized, public, and digital ledger technology in Peer-to-Peer network, blockchain has received much attention from various fields, including finance, healthcare, supply chain, etc.
Zijian Bao   +5 more
doaj   +1 more source

How blockchain impacts cloud-based system performance: a case study for a groupware communication application [PDF]

open access: yes, 2019
This paper examines the performance trade-off when implementing a blockchain architecture for a cloud-based groupware communication application. We measure the additional cloud-based resources and performance costs of the overhead required to implement a
Beck, Roman   +2 more
core   +1 more source

Blockchain for Internet of Things: A Survey [PDF]

open access: yesIEEE Internet of Things Journal, 2019
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges, such as decentralization, poor interoperability, privacy, and ...
Hongning Dai, Zibin Zheng, Yan Zhang
semanticscholar   +1 more source

Blockchain Ethics

open access: yesPhilosophies, 2023
There is no question about the innovation force and the economic potential of blockchain technology. As the basis for new currencies, financial services, and smart contracts, blockchain technology can be seen as the fifth disruptive computing paradigm, after mainframes, personal computers, the Internet, and mobile devices.
openaire   +3 more sources

Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

open access: yesCybersecurity, 2023
Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulnerability ...
Peng Liu   +6 more
doaj   +1 more source

A Blockchain-Based Trusted Upload Scheme for the Internet of Things Nodes

open access: yesInternational Journal of Crowd Science, 2022
In recent years, the theory and method of swarm intelligence based on the Internet have become the core research field of the new generation of Internet of Things (IoT). Both play a basic and supporting role in other research fields of IoT.
Yulei Jiao, Cexun Wang
doaj   +1 more source

Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract

open access: yesIEEE Access, 2022
Blockchain is a revolutionary technology that enables users to communicate in a trust-less manner. It revolutionizes the modes of business between organizations without the need for a trusted third party.
Satpal Singh Kushwaha   +4 more
semanticscholar   +1 more source

International policy coordination for blockchain supply chains

open access: yesAsia & the Pacific Policy Studies, 2019
From the adoption of the shipping container to coordinated trade liberalization, reductions in trade costs have propelled modern globalization.
Darcy W.E. Allen   +4 more
doaj   +1 more source

Cross‐organisational data sharing framework based on blockchain‐probes

open access: yesIET Networks, 2023
With the development of information technology, various social fields have gradually realised informatisation and digitisation, and today's society has entered the era of big data. A large amount of data exists in different departments and systems.
Xiaofeng Jia   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy