Results 131 to 140 of about 49,196 (298)

6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda   +4 more
wiley   +1 more source

Dissecting Ponzi schemes on Ethereum: identification, analysis, and\n impact [PDF]

open access: green, 2017
Massimo Bartoletti   +3 more
openalex   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Modeling and analysis of crypto-backed over-collateralized stable derivatives in DeFi

open access: yesFrontiers in Blockchain
In decentralized finance (DeFi), stablecoins like DAI are designed to offer a stable value amidst the fluctuating nature of cryptocurrencies. We examine the class of crypto-backed stable derivatives, focusing on mechanisms for price stabilization and ...
Zhenbang Feng   +3 more
doaj   +1 more source

PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain

open access: yesSensors, 2019
With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data.
Iago Sestrem Ochôa   +7 more
doaj   +1 more source

Selfish Mining in Ethereum

open access: yes2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019
As the second largest cryptocurrency by market capitalization and today's biggest decentralized platform that runs smart contracts, Ethereum has received much attention from both industry and academia. Nevertheless, there exist very few studies about the security of its mining strategies, especially from the selfish mining perspective.
Niu, Jianyu, Feng, Chen
openaire   +2 more sources

Confidential Wrapped Ethereum

open access: yes
Transparency is one of the key benefits of public blockchains. However, the public visibility of transactions potentially compromises users' privacy. The fundamental challenge is to balance the intrinsic benefits of blockchain openness with the vital need for individual confidentiality.
Chystiakov, Artem, Zhvanko, Mariia
openaire   +2 more sources

AN END-TO-END ETHEREUM EMPOWERED SUPPLY CHAIN MANAGEMENT IN INDUSTRY

open access: hybrid, 2023
K Gayathri   +23 more
openalex   +1 more source

Honeypot Method to Lure Attackers Without Holding Crypto-Assets

open access: yesIEEE Access
In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there have been reports of attacks on the blockchain networks that support crypto-assets in an ...
Hironori Uchibori   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy