Results 11 to 20 of about 1,233,173 (327)

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

Perfecting a General Notarial Bond: You Can't Have your Cake and Eat It! ABSA Bank Limited v Go on Supermarket (Pty) Limited (The Spar Group Limited intervening) (9442/2022) [2022] ZAGPJHC 173 (24 March 2022)

open access: yesPotchefstroom Electronic Law Journal, 2023
A general notarial bond registered over movable property grants the bondholder a real security right enforceable against third parties only if the bond has been perfected by transferring possession of the property to the bondholder.
Reghard Brits, Michel Marlize Koekemoer
doaj   +1 more source

Network structure and fragmentation of the Argentinean interbank markets

open access: yesLatin American Journal of Central Banking, 2022
This paper studies the network structure and fragmentation of the Argentinean interbank market. The unsecured (CALL) and secured (REPO) markets are examined, applying complex network analysis.
Pedro Elosegui   +2 more
doaj   +1 more source

Design and Implementation of a Cloud Based Decentralized Cryptocurrency Transaction Platform

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2022
Trading in the crypto-currency market has seen rapid growth and adoption, as well as the interest in crypto related technologies like blockchain and smart contracts.
Benjamin Kommey   +4 more
doaj   +1 more source

Secured Energy Trading Using Byzantine-Based Blockchain Consensus

open access: yesIEEE Access, 2020
To mitigate the problems of demand-supply mismatch in the future grid the solution of renewable energy source (RES) integration results in a bidirectional flow of information and transactions, which are prone to different kinds of cyber attacks ...
A. Sheikh   +5 more
doaj   +1 more source

Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey

open access: yesIEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021
Blockchain is a new generation of secure information technology that is fueling business and industrial innovation. Many studies on key enabling technologies for resource organization and system operation of blockchain-secured smart manufacturing in ...
Jiewu Leng   +7 more
semanticscholar   +1 more source

Enhancing Card Transaction Security through Cyber Security

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
This paper highlights the security issues associated with credit cards and underscores the crucial role of encryption in mitigating the risk of credit or debit card data theft. Credit card encryption encompasses safeguarding the card itself, securing the terminal used for card scanning, and ensuring the protection of card information during ...
Sudershan Manasvi Malhar -   +4 more
openaire   +1 more source

The Concept of Cryptocurrency in Axiology of Science Perspective

open access: yesDigital Press Social Sciences and Humanities, 2023
Massive transformation and multifaceted nature of innovation due to increasing interconnectivity in globalisation era–particularly through the discourse of the Internet of Things (IoT)– have made technology and its instruments nearly inevitable in ...
Rizal Mustansyir, Citra Istiqomah
doaj   +1 more source

Efficient and Secured Swarm Pattern Multi-UAV Communication

open access: yesIEEE Transactions on Vehicular Technology, 2021
Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints imposed by larger UAVs during emergency situations ...
G. Raja   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy