Results 131 to 140 of about 65,031 (278)
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley +1 more source
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
A research on cross‐chain and interoperation methods of fusion protocol
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming +4 more
doaj +1 more source
ABSTRACT We present the construction and validation of a scale for measuring cryptocurrency knowledge. As users continue to adopt digital currencies and government agencies introduce more regulatory legislation, researchers need to understand the general public's degree of literacy in this area.
Michael Jones +2 more
wiley +1 more source
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque +4 more
wiley +1 more source

