Results 31 to 40 of about 13,337 (106)
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed +5 more
wiley +1 more source
Chainspace: A Sharded Smart Contracts Platform
Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects.
Al-Bassam, Mustafa +4 more
core
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed +2 more
core
A Taxonomic Hierarchy of Blockchain Consensus Algorithms: An Evolutionary Phylogeny Approach. [PDF]
Kim H, Kim D.
europepmc +1 more source
Blockchain apply to the supply chain of essential medicines for the treatment of Covid-19 in Colombia. [PDF]
Ramirez Lopez LJ +2 more
europepmc +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
Aurora-Trinity: A Super-Light Client for Distributed Ledger Networks Extending the Ethereum Trinity Client. [PDF]
Benčić FM, Podnar Žarko I.
europepmc +1 more source
A Hybrid Federated Learning Framework for Enhancing Privacy and Robustness in Non-Intrusive Load Monitoring. [PDF]
Rong J, Zhou Q, Wu H.
europepmc +1 more source
Forensic Support for Abraham et al.'s BB Protocol. [PDF]
You Q +5 more
europepmc +1 more source
Privacy-Preserving Blockchain Technologies. [PDF]
Valadares DCG +4 more
europepmc +1 more source

