-
481
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01“…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. Due to the weakness in the signature scheme, it is possible to carry out a malleability attack (MA) by changing the transaction ID (TxId) without affecting the transaction’s actual content or validity. …”
Get full text
Article -
482
Fraudulent act: essence and legal regulation
Published 2024-06-01“…The article examines current issues of science and practice regarding the definition of the essence, signs and legal regulation of a fraudulent transaction as one of the types of contracts in civil law. …”
Get full text
Article -
483
Managerial decisions in syndicated lending
Published 2023-10-01“…Lenders of syndicated lending transactions, making decisions on participation in transactions in the primary syndicated lending market, use the opportunity to share the specialized risks of syndicated transactions within the syndicate. …”
Get full text
Article -
484
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…The IoT gateway node verifies the integrity and source of the data, then creates a block, and submits the block chain transaction. In order to avoid tracking the source of the data, a ring signature is used to anonymize the gateway transaction. …”
Get full text
Article -
485
The Necessity to Observe the Interests of the company in the Assumption of Director’s Contract with Himself with Recognition in the British Legal System
Published 2024-09-01“…In the British, the above transaction is also accepted; But it has differences with Iran; Such as all companies are subject to uniform rules.…”
Get full text
Article -
486
ТHE PROBLEMS OF THE SHADOW ECONOMY IN THE EUROPEAN UNION COUNTRIES
Published 2018-07-01“…However, despite all the advantages of modern technology and the fact that they allow to save transaction costs, many enterprises are still prone to the use of cash in the implementation of various types of transactions. …”
Get full text
Article -
487
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01“…In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. The transaction with the maximal ratio of sensitive to nonsensitive one is thus selected to be entirely deleted. …”
Get full text
Article -
488
Efisiensi Penggunaan QRIS Dengan Merchant Presented Mode Dalam Transaksi Pembayaran Non-Tunai
Published 2024-08-01“…One purpose of using QRIS in a shopping transaction is to improve and streamline the time used to complete the transaction. …”
Get full text
Article -
489
Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3
Published 2021-10-01“…Therefore, e-Payment plays an important role in the process of buying and selling transactions on the e-Marketplace, especially in payment transactions. …”
Get full text
Article -
490
Islamic law review on use of Go-Pay in payment of Zakat
Published 2020-04-01“…Not only in the scope of economic transactions around trade, but this online system has also been used in zakat payment transactions that use electronic money. …”
Get full text
Article -
491
Accounting Information and Financial Decision Making in Organizations in Kabale District.
Published 2024“…The first objective demonstrated that transaction processing systems play a vital role in decision-making. …”
Get full text
Thesis -
492
Hadoop in Banking: Event-Driven Performance Evaluation
Published 2025-01-01“…This study analyzes transaction and user engagement data using Hive queries, focusing on credit card transactions via MasterCard. …”
Get full text
Article -
493
The concept of "void contract" in public procurement
Published 2021-09-01“…The main conceptual differences between a void contract in public procurement and the civil law doctrine of a void transaction are established and characterized. The main difference from void transactions is that the parties and third parties do not have to obtain a court decision to apply the consequences of declaring a transaction invalid, but in cases established by the Civil Code of Ukraine, a void transaction may be recognized by a court as valid. …”
Get full text
Article -
494
Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain
Published 2025-01-01“…Suiet & Sui Wallet for Cost-Effective Transactions: Merging of Suiet and Sui Wallet enables cheap transactions and something that is always financially draining when using blockchain systems is deposits costly transactions fees. …”
Get full text
Article -
495
A resilience‐oriented restoration framework for multi‐area active distribution network following a disaster
Published 2024-12-01“…Since these areas are self‐interested agents, the energy transaction cost between them should be considered when determining the grid restoration scheme. …”
Get full text
Article -
496
INTERROGATING ISLAMIC LAW AND POSITIVE LAW AGAINST COUNTERFEIT PRODUCTS IN THE CONSUMER SOCIETY
Published 2022-12-01“…The ease of getting product with the same quality as the original product but have a minimal price is an advantage for the transaction, but that transaction also brings losses, especially for the owner of patent rights on the trademarks of the products being traded, on the condition that the loss is legally violated and provides criminal penalties and fines for the perpetrators, as well as in the point of view of Islamic law. …”
Get full text
Article -
497
Restrain Price Collusion in Trade-Based Supply Chain Finance
Published 2021-01-01“…This paper develops various game models for collusion and not collusion for different SCF transaction structures and investigates the impact of SCF transaction structures on the boundary conditions of collusion. …”
Get full text
Article -
498
Issues of insuring financial risks of leasing in project financing
Published 2025-01-01“…The increase in leasing transactions in Russia entails an increase in demand for insurance of such transactions, so the leasing object insurance is carried out in almost every transaction. …”
Get full text
Article -
499
Blockchain sharding scheme based on generative AI and DRL: Applied to building internet of things
Published 2024-01-01“…Existing solutions base their shard division on historical transaction moments, using the outcomes for future transaction processing. …”
Get full text
Article -
500
Recent Advances in Sharding Techniques for Scalable Blockchain Networks: A Review
Published 2025-01-01“…The increasing volume of transactions in blockchain networks has caused issues in terms of scalability, transaction efficiency, storage, and security, which obstruct the global adoption of blockchain technology. …”
Get full text
Article