Results 11 to 20 of about 30,192 (248)
Decentralization in Bitcoin and Ethereum Networks [PDF]
Blockchain-based cryptocurrencies have demonstrated how to securely implement traditionally centralized systems, such as currencies, in a decentralized fashion. However, there have been few measurement studies on the level of decentralization they achieve in practice.
Emin Gün Sirer+4 more
openaire +4 more sources
Using Ethereum Registration Authorities to establish Trust for Ethereum Private Sidechains [PDF]
Ethereum Private Sidechains are permissioned Ethereum blockchains which allow authorised participants to interact privately using Smart Contracts. Permissioned blockchains are appropriate for use in scenarios in which the list of blockchain participants and the code and state of contracts on the blockchain must be kept secret.
Peter Robinson
openaire +2 more sources
Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction [PDF]
Ethereum, the second-largest cryptocurrency after Bitcoin, has attracted wide attention in the last few years and accumulated significant transaction records. However, the underlying Ethereum network structure is still relatively unexplored.
Anwar Said+7 more
openalex +3 more sources
Although NFTs (non-fungible tokens) and cryptocurrencies are active on the same market, their prices are not so closely related over time. The objective of this paper is to identify the relationship between the two types of assets (NFTs and the ...
Simona Andreea Apostu+4 more
doaj +1 more source
In this paper, we present subgraphs of Ethereum wallets involved in NFT trades of the top 15 ERC721 NFT collections. To obtain the subgraphs, we have extracted the Ethereum transaction graph from a live Ethereum node and filtered out exchanges, mining ...
Aleksandar Tošić+2 more
doaj +1 more source
E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments [PDF]
—In the second decade of the twenty-first century, blockchain is considered one of the most popular computer technologies. Blockchain is a zero-trust network, making it a potent tool for various services provided that people are ready to believe and ...
Hind Hassan, Rehab Hassan, Ekhlas Gbashi
doaj +1 more source
Hybrid dual attack on LWE with arbitrary secrets
In this paper, we study the hybrid dual attack over learning with errors (LWE) problems for any secret distribution. Prior to our work, hybrid attacks are only considered for sparse and/or small secrets.
Lei Bi+4 more
doaj +1 more source
Abstract As a concern with manufacturing industries, circular economy (CE) practices—often labeled “circular manufacturing (CM)”—are industrial tasks through which several circular economy principles have been integrated. Among these circular manufacturing strategies, “3R” (recycle, refurbish/remanufacture, and reuse/redistribute) is the key strategy ...
Kannan Govindan
wiley +1 more source
A Model of Trust in Ethereum Token ‘Ether’ Payments, TRUSTEP
Ethereum is being utilized in various ways, including smart contracts and payments. Research in cryptocurrency payments has either been general, about all cryptocurrencies or focused primarily on Bitcoin.
Alex Zarifis
doaj +1 more source
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla+6 more
doaj +1 more source