Results 11 to 20 of about 1,233,173 (327)
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim +5 more
doaj +1 more source
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI +3 more
doaj +1 more source
A general notarial bond registered over movable property grants the bondholder a real security right enforceable against third parties only if the bond has been perfected by transferring possession of the property to the bondholder.
Reghard Brits, Michel Marlize Koekemoer
doaj +1 more source
Network structure and fragmentation of the Argentinean interbank markets
This paper studies the network structure and fragmentation of the Argentinean interbank market. The unsecured (CALL) and secured (REPO) markets are examined, applying complex network analysis.
Pedro Elosegui +2 more
doaj +1 more source
Design and Implementation of a Cloud Based Decentralized Cryptocurrency Transaction Platform
Trading in the crypto-currency market has seen rapid growth and adoption, as well as the interest in crypto related technologies like blockchain and smart contracts.
Benjamin Kommey +4 more
doaj +1 more source
Secured Energy Trading Using Byzantine-Based Blockchain Consensus
To mitigate the problems of demand-supply mismatch in the future grid the solution of renewable energy source (RES) integration results in a bidirectional flow of information and transactions, which are prone to different kinds of cyber attacks ...
A. Sheikh +5 more
doaj +1 more source
Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey
Blockchain is a new generation of secure information technology that is fueling business and industrial innovation. Many studies on key enabling technologies for resource organization and system operation of blockchain-secured smart manufacturing in ...
Jiewu Leng +7 more
semanticscholar +1 more source
Enhancing Card Transaction Security through Cyber Security
This paper highlights the security issues associated with credit cards and underscores the crucial role of encryption in mitigating the risk of credit or debit card data theft. Credit card encryption encompasses safeguarding the card itself, securing the terminal used for card scanning, and ensuring the protection of card information during ...
Sudershan Manasvi Malhar - +4 more
openaire +1 more source
The Concept of Cryptocurrency in Axiology of Science Perspective
Massive transformation and multifaceted nature of innovation due to increasing interconnectivity in globalisation era–particularly through the discourse of the Internet of Things (IoT)– have made technology and its instruments nearly inevitable in ...
Rizal Mustansyir, Citra Istiqomah
doaj +1 more source
Efficient and Secured Swarm Pattern Multi-UAV Communication
Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints imposed by larger UAVs during emergency situations ...
G. Raja +5 more
semanticscholar +1 more source

