Results 41 to 50 of about 16,653 (224)
Steganographic Analysis of Blockchains
Steganography is one of the ways to hide data between parties. Its use can be worrisome, e.g., to hide illegal communications. Researchers found that public blockchains can be an attractive place to hide communications; however, there is not much ...
Alexandre Augusto Giron +2 more
doaj +1 more source
Purpose: It can be stated that in today’s competitive conditions, where portfolio management is very important, it has become necessary to examine the relationship between global financial assets and major cryptocurrencies, such as Bitcoin and Ethereum ...
Kübra Saka Ilgin
doaj +1 more source
CryptoKitties Transaction Network Analysis: The Rise and Fall of the First Blockchain Game Mania
CryptoKitties was the first widely recognized blockchain game. Players could own, breed, and trade kitties, which are the only prop in the game. The game gained explosive growth upon its release but quickly collapsed in a short time.
Xin-Jian Jiang, Xiao Fan Liu
doaj +1 more source
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
We present and analyze an attack on Ethereum 1's consensus mechanism, which allows miners to obtain higher mining rewards compared to their honest peers.
Aviv Yaish, Gilad Stern
semanticscholar +1 more source
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
Adaptive multi-channel Bayesian graph attention network for IoT transaction security
With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new phase of applications and is rapidly becoming a significant force in promoting economic development.
Zhaowei Liu +3 more
doaj +1 more source
Practical Limitations of Ethereum’s Layer-2
Most permissionless blockchains inherently suffer from throughput limitations. Layer-2 systems, such as side-chains or Rollups, have been proposed as a possible strategy to overcome this limitation.
Ray Neiheiser +5 more
semanticscholar +1 more source
Intraday Functional PCA Forecasting of Cryptocurrency Returns
ABSTRACT We study the functional PCA (FPCA) forecasting method in application to functions of intraday returns on Bitcoin. We show that improved interval forecasts of future return functions are obtained when the conditional heteroscedasticity of return functions is taken into account.
Joann Jasiak, Cheng Zhong
wiley +1 more source
Electronic voting systems must find solutions to various issues with authentication, data privacy and integrity, transparency, and verifiability. On the other hand, Blockchain technology offers an innovative solution to many of these problems.
Uzma Jafar +3 more
doaj +1 more source
Demand Elasticities of Bitcoin and Ethereum
In this paper we analyze dynamic demand elasticity for Bitcoin and Ethereum in terms of price, transaction fees, and energy usage. We find that while both BTC and ETH have significantly positive price elasticities, transaction fee elasticity is negative and positive for BTC and ETH respectively, indicating differences in potential uses for these ...
Jalan, Akanksha +2 more
openaire +3 more sources

