Results 311 to 320 of about 1,636,081 (333)
Some of the next articles are maybe not open access.

Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster

IEEE Transactions on Parallel and Distributed Systems, 2023
Smart contract technologies can be used to implement almost arbitrary business logic. They can revolutionize many businesses such as payments, insurance, and crowdfunding.
Zecheng Li   +3 more
semanticscholar   +1 more source

Securify: Practical Security Analysis of Smart Contracts

Conference on Computer and Communications Security, 2018
Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov   +5 more
semanticscholar   +1 more source

Smart Contracts, Bitcoin Bots, and Consumer Protection

Social Science Research Network
Trustless public ledgers (“TPLs”)—the technology underneath Bitcoin—do more than just create online money. The technology permits people to directly exchange money for what they want, with no intermediaries, such as credit card companies. Contract law is
Joshua Fairfield
semanticscholar   +1 more source

Malicious Code Detection in Smart Contracts via Opcode Vectorization

arXiv.org
With the booming development of blockchain technology, smart contracts have been widely used in finance, supply chain, Internet of things and other fields in recent years.
Huanhuan Zou, Zongwei Li, Xiaoqi Li
semanticscholar   +1 more source

SCALM: Detecting Bad Practices in Smart Contracts Through LLMs

AAAI Conference on Artificial Intelligence
As the Ethereum platform continues to mature and gain widespread usage, it is crucial to maintain high standards of smart contract writing practices. While bad practices in smart contracts may not directly lead to security issues, they do elevate the ...
Zongwei Li   +3 more
semanticscholar   +1 more source

Finding permission bugs in smart contracts with role mining

International Symposium on Software Testing and Analysis, 2022
Smart contracts deployed on permissionless blockchains, such as Ethereum, are accessible to any user in a trustless environment. Therefore, most smart contract applications implement access control policies to protect their valuable assets from ...
Ye Liu   +3 more
semanticscholar   +1 more source

Smart Contracts in the Real World: A Statistical Exploration of External Data Dependencies

arXiv.org
Smart contracts with external data are crucial for functionality but pose security and reliability concerns. Statistical and quantitative studies on this interaction are scarce.
Yishun Wang   +3 more
semanticscholar   +1 more source

Interpretation of Contracts and Smart Contracts: Smart Interpretation or Interpretation of Smart Contracts?

European Review of Private Law, 2018
Abstract: The computer language (computer code) on the basis of which smart contracts are written is different from the natural (Human) language. Computer language is a ‘dry’ language, whereas natural language is ‘wet’. In other words, it means that computer language is deterministic (just one meaning and one result are conceivable), when natural ...
openaire   +1 more source

Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends

IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019
In recent years, the rapid development of cryptocurrencies and their underlying blockchain technology has revived Szabo’s original idea of smart contracts, i.e., computer protocols that are designed to automatically facilitate, verify, and enforce the ...
Shuai Wang   +5 more
semanticscholar   +1 more source

ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs

IEEE Symposium on Security and Privacy, 2022
Data privacy is a key concern for smart contracts handling sensitive data. The existing work zkay addresses this concern by allowing developers without cryptographic expertise to enforce data privacy. However, while zkay avoids fundamental limitations of
Samuel Steffen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy