|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Felix Kahmann, Fabian Honecker, Julian Dreyer, Marten Fischer and Ralf Tönjes
Since the introduction of the first cryptocurrency, Bitcoin, in 2008, the gain in popularity of distributed ledger technologies (DLTs) has led to an increasing demand and, consequently, a larger number of network participants in general. Scaling blockcha...
ver más
|
|
|
|
|
|
|
Muntadher Sallal, Ruairí de Fréin and Ali Malik
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ...
ver más
|
|
|
|
|
|
|
Mahmoud Bidry, Abdellah Ouaguid and Mohamed Hanine
Blockchain represents a decentralized and distributed ledger technology, ensuring transparent and secure transaction recording across networks. This innovative technology offers several benefits, including increased security, trust, and transparency, mak...
ver más
|
|
|
|
|
|
|
Eman Daraghmi, Cheng-Pu Zhang and Shyan-Ming Yuan
The saga pattern manages transactions and maintains data consistency across distributed microservices via utilizing local sequential transactions that update each service and publish messages to trigger the next ones. Failure by one transaction causes th...
ver más
|
|
|
|
|
|
|
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Gongxue Sun and Tao Feng
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize...
ver más
|
|
|
|
|
|
|
Gousia Habib, Sparsh Sharma, Sara Ibrahim, Imtiaz Ahmad, Shaima Qureshi and Malik Ishfaq
The real-world use cases of blockchain technology, such as faster cross-border payments, identity management, smart contracts, cryptocurrencies, and supply chain?blockchain technology are here to stay and have become the next innovation, just like the In...
ver más
|
|
|
|
|
|
|
Antonios Makris, Ioannis Kontopoulos, Evangelos Psomakelis, Stylianos Nektarios Xyalis, Theodoros Theodoropoulos and Konstantinos Tserpes
Edge computing constitutes a promising paradigm of managing and processing the massive amounts of data generated by Internet of Things (IoT) devices. Data and computation are moved closer to the client, thus enabling latency- and bandwidth-sensitive appl...
ver más
|
|
|
|
|
|
|
Benjamin Leiding, Priyanka Sharma and Alexander Norta
Nowadays, business enactments almost exclusively focus on human-to-human business transactions. However, the ubiquitousness of smart devices enables business enactments among autonomously acting machines, thereby providing the foundation for the machine-...
ver más
|
|
|
|