Results 121 to 130 of about 32,420 (268)

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

A Chain Key Model Based on Message Hash Chain

open access: yes
To address the issue of key lifespan in key security, a chain key model based on a message hash chain is proposed. This model breaks away from the traditional scheme of generating random keys using random number generators, using plaintext features as a source of randomness, and generates the next key in conjunction with the current key, achieving key ...
Wenbao Jiang   +3 more
openaire   +1 more source

Correcting a delegation protocol for grids [PDF]

open access: yes, 2011
B. Aziz   +6 more
core   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Verifying a delegation protocol for Grid systems [PDF]

open access: yes, 2011
Aziz, Benjamin, Hamilton, G.
core   +1 more source

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

Frontiers of Blockchain Applications in HRM: An Exploration Through Theoretical Integration and Qualitative Inquiry

open access: yesAsia Pacific Journal of Human Resources, Volume 64, Issue 1, January 2026.
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias   +2 more
wiley   +1 more source

Integrated framework for supply chain with blockchain technology: a manufacturers’ perspective

open access: yesJournal of Innovation and Entrepreneurship
Industries aims to have a paradigm shift in supply chains (SC) to provide transparency in the shared information for the economic and social benefits of the stakeholders in an SC. The revolution of Blockchain Technology (BT) allows all the parties in the
Dnyaneshwar Jivanrao Ghode   +3 more
doaj   +1 more source

The Myths of Blockchain Governance

open access: yesCorporate Governance: An International Review, Volume 34, Issue 1, Page 154-162, January 2026.
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley   +1 more source

Home - About - Disclaimer - Privacy