-
561
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization
Published 2024-12-01Subjects: Get full text
Article -
562
Do They Know It’s Christmas?
Published 2024-12-01“…Blockchain in Healthcare Today…”
Get full text
Article -
563
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
Published 2024-12-01“…Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. …”
Get full text
Article -
564
Analysis of Revenue Incentive Dynamic Mechanism of Financial Supply Chain from the Perspective of the Internet of Things
Published 2021-01-01“…This article integrates blockchain technology with supply chain finance and builds a supply chain financial alliance architecture based on blockchain technology and an underlying model of the Ethereum blockchain system suitable for supply chain finance. …”
Get full text
Article -
565
Design and Implementation of Decentralized Swarm Intelligence E-Commerce Model Based on Regional Chain and Edge Computing
Published 2021-01-01“…In this paper, we investigate the model of decentralized groupwise e-commerce through regional chains combined with edge computing algorithms and design and implement it. A blockchain-based architecture for remote sensing resource and service transactions is proposed. …”
Get full text
Article -
566
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01“…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
Get full text
Article -
567
Traceability permissioned chain consensus mechanism based on double-layer architecture
Published 2019-04-01“…The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.…”
Get full text
Article -
568
Incentive Mechanism Design for Distributed Autonomous Organizations Based on the Mutual Insurance Scenario
Published 2021-01-01“…The rise of blockchain has led to discussions on new governance models and the cooperation of multiple participants. …”
Get full text
Article -
569
High-Performance stacking ensemble learning for thermoelectric figure-of-merit prediction
Published 2025-01-01Get full text
Article -
570
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01“…In this article, we apply blockchain technology in spectrum sensing process and propose a related algorithm based on reputation. …”
Get full text
Article -
571
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01“…Various solutions have been proposed to address these issues, leveraging technologies such as Certificate Authorities (CAs) and blockchain. However, the CA model is inherently centralized, while blockchain-based solutions suffer from relatively low efficiency. …”
Get full text
Article -
572
Data traceability mechanism based on consortium chain
Published 2023-10-01“…With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow between different blockchains, new security issues arise.Cross-chain data transmission can lead to data leakage, and detecting data leakage caused by illegal access becomes challenging.To address these problems, a data traceability mechanism based on a consortium chain was proposed.A cross-blockchain data traceability model was designed, incorporating private data pipelines to ensure the security of cross-chain data transmission.User behaviors were recorded through authorization and access logs, ensuring the traceability of illegal unauthorized access.To improve the efficiency of data traceability and query, an on-chain and off-chain synchronous storage mechanism was adopted.The state of data flow before each transaction was encrypted and stored in the database, and its index was stored in the blockchain transaction.This enables a one-to-one correspondence between on-chain and off-chain data.Additionally, Merkle trees were introduced into the block body to store block summaries, enhancing the efficiency of block legitimacy verification.Based on the data storage form and cross-chain data interaction mechanism, a data traceability algorithm was designed.The traceability results were displayed in the form of an ordered tree.An experimental environment for consortium chain traceability was built using fabric, targeting the cross-domain data traceability scenario in the e-commerce industry.The GO language was used to simulate and test the data traceability performance with a large number of blocks and transactions.The results demonstrate that with the increasing number of blocks and transactions, the proposed data traceability mechanism maintains satisfactory performance.…”
Get full text
Article -
573
Automatic Player Face Detection and Recognition for Players in Cricket Games
Published 2024-01-01Get full text
Article -
574
NONLINEAR PROOF-OF-WORK: IMPROVING THE ENERGY EFFICIENCY OF BITCOIN MINING
Published 2020-09-01“… Bitcoin is probably the most well-known blockchain system in existence. It employs the proof-of-work (PoW) consensus algorithm to add transactions to the blockchain. …”
Get full text
Article -
575
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01“…For real-time data integrity, we propose an integrity verification algorithm that cross-references hash values stored in the cloud and blockchain, enabling fast and lightweight integrity checks. …”
Get full text
Article -
576
The Impact of Digitization on Legal Systems in Developing Countries
Published 2025-01-01“…The study identifies blockchain as a critical tool for ensuring the integrity and security of legal records, providing tamper-proof documentation, and fostering trust in legal processes. …”
Get full text
Article -
577
Certain Aspects of the Analysis of Cryptocurrency Transactions during the Prevention and Investigation of Crimes
Published 2021-03-01“…The authors have revealed the possibilities of separate services intended for the analysis of cryptocurrency transactions (Maltego, Bitconeview, Bitiodine, OpReturnTool, Blockchain.info, Anyblockanalytics.com, Chainalysis, Elliptic, Ciphertrace, Blockchain Inspector). …”
Get full text
Article -
578
Exploring the Mesoscopic Structure of Bitcoin During its First Decade of Life
Published 2025-01-01Get full text
Article -
579
Temperature Estimation of Smart Homes with Sensors in Internet of Things Environment based on Block Chain
Published 2023-03-01“…A processor environment has been created as the central base using a blockchain for optimally adapting the ambient temperature of the environment based on a robust controller, which is used in the PID-HTC controller structure of the blockchain to control the temperature accurately. …”
Get full text
Article -
580
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article