Results 131 to 140 of about 49,196 (298)
6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda +4 more
wiley +1 more source
Dissecting Ponzi schemes on Ethereum: identification, analysis, and\n impact [PDF]
Massimo Bartoletti +3 more
openalex +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Modeling and analysis of crypto-backed over-collateralized stable derivatives in DeFi
In decentralized finance (DeFi), stablecoins like DAI are designed to offer a stable value amidst the fluctuating nature of cryptocurrencies. We examine the class of crypto-backed stable derivatives, focusing on mechanisms for price stabilization and ...
Zhenbang Feng +3 more
doaj +1 more source
PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain
With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data.
Iago Sestrem Ochôa +7 more
doaj +1 more source
As the second largest cryptocurrency by market capitalization and today's biggest decentralized platform that runs smart contracts, Ethereum has received much attention from both industry and academia. Nevertheless, there exist very few studies about the security of its mining strategies, especially from the selfish mining perspective.
Niu, Jianyu, Feng, Chen
openaire +2 more sources
Design and Conception of Will Notarization System Based on Ethereum
Fanglei Liu, Jianxiang Zhao
openalex +2 more sources
Transparency is one of the key benefits of public blockchains. However, the public visibility of transactions potentially compromises users' privacy. The fundamental challenge is to balance the intrinsic benefits of blockchain openness with the vital need for individual confidentiality.
Chystiakov, Artem, Zhvanko, Mariia
openaire +2 more sources
AN END-TO-END ETHEREUM EMPOWERED SUPPLY CHAIN MANAGEMENT IN INDUSTRY
K Gayathri +23 more
openalex +1 more source
Honeypot Method to Lure Attackers Without Holding Crypto-Assets
In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there have been reports of attacks on the blockchain networks that support crypto-assets in an ...
Hironori Uchibori +2 more
doaj +1 more source

