Results 131 to 140 of about 65,031 (278)

The Myths of Blockchain Governance

open access: yesCorporate Governance: An International Review, EarlyView.
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, EarlyView.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

Digital Identity Wallets: A Guide to the EU’s New Identity Model

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra   +5 more
wiley   +1 more source

Can Complementary Currencies Foster Sustainability? A Systematic Review of the Impacts of Environmental Complementary Currencies

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley   +1 more source

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, EarlyView.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

A research on cross‐chain and interoperation methods of fusion protocol

open access: yesIET Blockchain
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming   +4 more
doaj   +1 more source

Measuring Crypto Literacy

open access: yesJournal of Consumer Affairs, Volume 59, Issue 4, Winter 2025.
ABSTRACT We present the construction and validation of a scale for measuring cryptocurrency knowledge. As users continue to adopt digital currencies and government agencies introduce more regulatory legislation, researchers need to understand the general public's degree of literacy in this area.
Michael Jones   +2 more
wiley   +1 more source

Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 25-26, 30 November 2025.
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy