Results 51 to 60 of about 374,311 (355)
Full Text PDF of The JBBA, Vol 5 Issue 2, November 2022
Full Text PDF of The JBBA, Vol 5 Issue 2, November 2022.
The British Blockchain Association
doaj
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun+3 more
doaj +1 more source
Full Text PDF of The JBBA, 11th Issue, May 2023
Full Text PDF of The JBBA, 11th Issue, May ...
The British Blockchain Association
doaj
Full Text PDF of Volume 6, Issue 2, of The JBBA, Nov 2023
Full Text PDF of Volume 6, Issue 2, of The JBBA, Nov ...
The British Blockchain Association
doaj
Decentralisation in the blockchain space [PDF]
The rapidly evolving blockchain technology space has put decentralisation back into the focus of the design of techno-social systems, and the role of decentralised technological infrastructures in achieving particular social, economic, or political goals. In this entry we address how blockchains and distributed ledgers think about decentralisation.
Bodó, B., Brekke, J.K., Hoepman, J.-H.
openaire +8 more sources
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract
Blockchain is a revolutionary technology that enables users to communicate in a trust-less manner. It revolutionizes the modes of business between organizations without the need for a trusted third party.
Satpal Singh Kushwaha+4 more
semanticscholar +1 more source
Blockchain smart contracts: Applications, challenges, and future trends
In recent years, the rapid development of blockchain technology and cryptocurrencies has influenced the financial industry by creating a new crypto-economy.
S. Khan+4 more
semanticscholar +1 more source
The Judicialisation of the Blockchain [PDF]
Abstract This chapter argues that blockchain technologies structurally tend towards ‘judicialization’ and challenge the traditional, state-centric notions of jurisdiction and enforcement. After an introductory section, section II sets the scene by locating the emergence of blockchain technologies within the broader debate concerning the ...
openaire +2 more sources
On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan+5 more
core +1 more source
Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M.+4 more
core +2 more sources