Honeypot Method to Lure Attackers Without Holding Crypto-Assets
In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there have been reports of attacks on the blockchain networks that support crypto-assets in an ...
Hironori Uchibori+2 more
doaj +1 more source
CRYPTO-SPATIAL: AN OPEN STANDARDS SMART CONTRACTS LIBRARY FOR BUILDING GEOSPATIALLY ENABLED DECENTRALIZED APPLICATIONS ON THE ETHEREUM BLOCKCHAIN [PDF]
A. Benahmed Daho
openalex +1 more source
Factors that Impact Blockchain Scalability [PDF]
Beck, Roman, Eklund, Peter
core +1 more source
Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks
TonTon Hsien-De Huang
openalex +2 more sources
EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains [PDF]
Chao Li, Balaji Palanisamy
openalex +1 more source
Rich specifications for Ethereum smart contract verification [PDF]
Christian Bräm+4 more
openalex +1 more source
BACP-LRS: Blockchain and IPFS-based Land Record System
Background: Land records have traditionally derived their credibility from a central database of local government records, with copies issued to land owners.
Insaf Boumezbeur+5 more
doaj +1 more source
Characterizing relationships between primary miners in Ethereum by analyzing on-chain transactions [PDF]
Daniel Rincon Silva
openalex +1 more source
Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum [PDF]
Iván Gutiérrez-Agüero+4 more
openalex +1 more source