派博傳思國際中心

標(biāo)題: Titlebook: Blockchain and Trustworthy Systems; Second International Zibin Zheng,Hong-Ning Dai,Benhui Chen Conference proceedings 2020 Springer Nature [打印本頁]

作者: 頻率    時(shí)間: 2025-3-21 19:26
書目名稱Blockchain and Trustworthy Systems影響因子(影響力)




書目名稱Blockchain and Trustworthy Systems影響因子(影響力)學(xué)科排名




書目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開度




書目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Blockchain and Trustworthy Systems被引頻次




書目名稱Blockchain and Trustworthy Systems被引頻次學(xué)科排名




書目名稱Blockchain and Trustworthy Systems年度引用




書目名稱Blockchain and Trustworthy Systems年度引用學(xué)科排名




書目名稱Blockchain and Trustworthy Systems讀者反饋




書目名稱Blockchain and Trustworthy Systems讀者反饋學(xué)科排名





作者: 柔聲地說    時(shí)間: 2025-3-21 20:43

作者: 熄滅    時(shí)間: 2025-3-22 01:35

作者: PAC    時(shí)間: 2025-3-22 07:56

作者: 獸群    時(shí)間: 2025-3-22 11:46
J?rn Peter Hiekel,Christian Utzices from being selected. For the second phase, we devise a participant-selection algorithm that enables the FL server to select the appropriate group of devices for each round of FL-training. We believe that our study can shed new light on the joint research of blockchain and federated learning.
作者: 克制    時(shí)間: 2025-3-22 16:54
J?rn Peter Hiekel,Christian Utz, we carefully designed a trading contract to ensure a fair and transparent trading process. In addition, we build a matching score calculation algorithm, according to which PSM. can determine the price for purchasing someone’s contact information. Finally, we develop a proof of concept prototype on
作者: Parameter    時(shí)間: 2025-3-22 18:33

作者: FLIC    時(shí)間: 2025-3-22 23:22
Felix W?rner,Melanie Wald-Fuhrmannastly, based on the analysis of the Ether flow of the phishing scam cycle, we propose an improved Graph2Vec, and make classification prediction on the subgraphs we built. The experimental results show that our framework has achieved a great competitiveness in the final classification task, which als
作者: Ordnance    時(shí)間: 2025-3-23 01:48
Felix W?rner,Melanie Wald-Fuhrmanne 0.98, 0.93 and 0.95 respectively by experiments. Smart Ponzi schemes hidden on Ethereum are detected effectively by the model. More importantly, the performance of model is guaranteed at any moment in the lifecycle, even at the birth of a smart Ponzi scheme.
作者: Enthralling    時(shí)間: 2025-3-23 08:54

作者: MOAT    時(shí)間: 2025-3-23 13:28

作者: MITE    時(shí)間: 2025-3-23 14:43

作者: laceration    時(shí)間: 2025-3-23 21:21
PBFT Consensus Performance Optimization Method for Fusing C4.5 Decision Tree in Blockchainetwork, and effectively reduces the non-honesty node as the primary node. On this basis, the voting weight is introduced. Consistency verification can be completed only by considering a small number of trusted nodes voting weights, thereby reducing the number of messages broadcasted in the network.
作者: 油氈    時(shí)間: 2025-3-23 23:09

作者: ensemble    時(shí)間: 2025-3-24 05:08
Blockchain-Based Participant Selection for Federated Learningices from being selected. For the second phase, we devise a participant-selection algorithm that enables the FL server to select the appropriate group of devices for each round of FL-training. We believe that our study can shed new light on the joint research of blockchain and federated learning.
作者: 沙草紙    時(shí)間: 2025-3-24 08:43

作者: mitral-valve    時(shí)間: 2025-3-24 12:26

作者: intoxicate    時(shí)間: 2025-3-24 15:23

作者: Panacea    時(shí)間: 2025-3-24 19:07
Detection of Smart Ponzi Schemes Using Opcodee 0.98, 0.93 and 0.95 respectively by experiments. Smart Ponzi schemes hidden on Ethereum are detected effectively by the model. More importantly, the performance of model is guaranteed at any moment in the lifecycle, even at the birth of a smart Ponzi scheme.
作者: Irksome    時(shí)間: 2025-3-25 01:43
Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approachdata as much as possible, so as to improve the system performance and protect the security and privacy of user data. At the same time, we study data privacy protection from the perspective of software architecture, and propose a data privacy protection scheme through algorithm decomposition multi ce
作者: Ledger    時(shí)間: 2025-3-25 07:22
Modeling and Verification of the Nervos CKB Block Synchronization Protocol in UPPAALronization protocol is an important part of the Nervos CKB, which provides a set of rules that participating nodes must obey while synchronizing their blocks. The protocol contains three stages: Connecting Header, Downloading Block and Accepting Block. In this paper, we develop the formal model of t
作者: 機(jī)制    時(shí)間: 2025-3-25 09:40
A Blockchain Consensus Mechanism for Marine Data Management Systemas great application potential in the marine field. Its “decentralized” feature can maintain data security and reliability through decentralized methods. Marine data management system is one of the specific application scenarios that blockchain technology is used to protect marine network data infor
作者: 主講人    時(shí)間: 2025-3-25 12:24

作者: 嫻熟    時(shí)間: 2025-3-25 18:05
The Framework of Consensus Equilibria for Gap Games in Blockchain Ecosystems to explain the stable in the sense for the existence of consensus equilibria related to mining gap game’s behaviors by using one new concept called “Consensus Games” under the environment of Blockchain Ecosystems, where, the Blockchain Ecosystem mainly means the economic activities by taking into t
作者: 搜集    時(shí)間: 2025-3-25 23:28
DP-Hybrid: A Two-Layer Consensus Protocol for High Scalability in Permissioned Blockchaintance. In these industries applications, the permissioned blockchain maintained by multiple participants often has a large number of nodes. The PBFT consensus is commonly used in the permissioned blockchain, but it requires a large amount of message transmission to reach consensus, resulting in poor
作者: Servile    時(shí)間: 2025-3-26 02:31

作者: 是剝皮    時(shí)間: 2025-3-26 08:14
PBFT Consensus Performance Optimization Method for Fusing C4.5 Decision Tree in Blockchain chain finance, credit reporting and other fields. However, in the actual blockchain system application, there are two main problems in the Hyperledger Fabric license alliance chain based on the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism: 1) The non-honesty node acts as the prima
作者: 勾引    時(shí)間: 2025-3-26 11:24

作者: 脆弱帶來    時(shí)間: 2025-3-26 15:40
Blockchain-Based Participant Selection for Federated Learning benefited from the rich local datasets, while preserving the privacy of local training dataset in each participant. This is because only the training results, i.e., the updated model parameters and model weights are needed to report to the FL server for aggregation in each round of FL-training. How
作者: padding    時(shí)間: 2025-3-26 20:51
PSM,: A Privacy-Preserving Self-sovereign Match-Making Platformnd users are only required to provide their personal information and preferences to match with others, which is accurate and efficient. However, as data privacy laws such as European Union(EU)’s General Data Protection Regulations(GDPR) aims to give control back to consumers over their personal data
作者: debunk    時(shí)間: 2025-3-26 21:34

作者: Cytology    時(shí)間: 2025-3-27 04:12

作者: 言行自由    時(shí)間: 2025-3-27 05:31
PoW-Based Sybil Attack Resistant Model for P2P Reputation Systemsmake better decisions in P2P systems, but Sybil attacker can obtain multiple identities and pretends to be multiple. It can control more than “one vote” to let others’ reputation change just as the attacker wants. This paper presents a Sybil attacker resistant model for P2P reputation systems by int
作者: amphibian    時(shí)間: 2025-3-27 13:17
Phishing Detection on Ethereum via Learning Representation of Transaction Subgraphsy phishing scams. It forces us to explore more efficient countermeasures and perspectives for better solution. Since graph modeling provides rich information for possible downstream tasks, we use a surrounding graph to model the transaction data of a target address, aiming to analyze the identity of
作者: 向外才掩飾    時(shí)間: 2025-3-27 16:37
Detection of Smart Ponzi Schemes Using Opcode has affected the development of blockchain ecology. Smart Ponzi scheme which realized by smart contract is a new type of Ponzi scheme and running on Ethereum. It would cause more serious damage to society in less time than other Ponzi schemes. Timely and comprehensive detection of all smart Ponzi s
作者: 恭維    時(shí)間: 2025-3-27 21:31
Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approachsmission and storage of users’ data privacy, which improves the security and reliability of processing. The non central blockchain technology uses distributed ledger technology to realize the characteristics of disintermediation, data tampering, traceability, work audit, etc. encryption algorithm is
作者: 死亡    時(shí)間: 2025-3-28 00:10
Conference proceedings 2020cksys 2020, held in Dali, China*, in August 2020..The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections:?theories and algorithms for blockchain,?performance optimization of blockchain,?blockchain security an
作者: Fissure    時(shí)間: 2025-3-28 03:52

作者: 毗鄰    時(shí)間: 2025-3-28 09:20
A Blockchain-Based Distributed Authentication and Dynamic Group Key Agreement Protocolibuted authentication and dynamic group key agreement protocol. Based on blockchain technology, this protocol improves the scalability and makes it possible to track malicious members. In addition, comparison with related protocols shows that our protocol reduces computational and communication costs.
作者: 變色龍    時(shí)間: 2025-3-28 13:45

作者: 匍匐前進(jìn)    時(shí)間: 2025-3-28 17:43

作者: 美麗的寫    時(shí)間: 2025-3-28 21:07

作者: 慷慨不好    時(shí)間: 2025-3-29 00:22
1865-0929 stems, Blocksys 2020, held in Dali, China*, in August 2020..The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections:?theories and algorithms for blockchain,?performance optimization of blockchain,?blockchain s
作者: Vldl379    時(shí)間: 2025-3-29 05:50

作者: 大方一點(diǎn)    時(shí)間: 2025-3-29 07:59

作者: AV-node    時(shí)間: 2025-3-29 11:34

作者: 記成螞蟻    時(shí)間: 2025-3-29 19:31
A Complete Anti-collusion Mechanism in Blockchainns in CACM. We implement CACM on the Ethereum test network, and the CACM circuit on local machine. The experiments show the low cost of time and gas respectively in generating zkSNARKs proof and interactions with smart contract, which proves CACM is efficient.
作者: 替代品    時(shí)間: 2025-3-29 23:41

作者: 單色    時(shí)間: 2025-3-30 03:41

作者: 發(fā)怨言    時(shí)間: 2025-3-30 04:56

作者: Arthropathy    時(shí)間: 2025-3-30 10:48
DP-Hybrid: A Two-Layer Consensus Protocol for High Scalability in Permissioned Blockchain protocol. DP-Hybrid reduces the communication costs from PBFT’s . to .. The experiment results show that DP-Hybrid’s throughput is always about 10 times that of PBFT when the number of nodes increases.
作者: fatty-streak    時(shí)間: 2025-3-30 12:35

作者: infantile    時(shí)間: 2025-3-30 18:40
Willy Schneider,Alexander Hennigronization protocol is an important part of the Nervos CKB, which provides a set of rules that participating nodes must obey while synchronizing their blocks. The protocol contains three stages: Connecting Header, Downloading Block and Accepting Block. In this paper, we develop the formal model of t
作者: BUDGE    時(shí)間: 2025-3-30 21:24

作者: 沒有準(zhǔn)備    時(shí)間: 2025-3-31 02:24
https://doi.org/10.1007/978-3-531-93431-0nd incentive method. Malicious users may collude others to get more votes, in order to get rewards. We present a complete anti-collusion mechanism (CACM), aiming to cheat the malicious users who want to collude others. Each vote will be committed on smart contract and consumes the commitment for las
作者: single    時(shí)間: 2025-3-31 05:49
https://doi.org/10.1007/978-3-531-93431-0 to explain the stable in the sense for the existence of consensus equilibria related to mining gap game’s behaviors by using one new concept called “Consensus Games” under the environment of Blockchain Ecosystems, where, the Blockchain Ecosystem mainly means the economic activities by taking into t
作者: 秘方藥    時(shí)間: 2025-3-31 11:15





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
仁怀市| 克拉玛依市| 内江市| 界首市| 克拉玛依市| 仁怀市| 宝坻区| 长春市| 洛扎县| 山阳县| 黑河市| 阆中市| 正宁县| 金堂县| 诸暨市| 盖州市| 阳城县| 灌云县| 谢通门县| 玉溪市| 普兰县| 贵定县| 宝兴县| 济南市| 印江| 汕头市| 平舆县| 且末县| 唐河县| 新安县| 中宁县| 林口县| 灵山县| 论坛| 郸城县| 德庆县| 会理县| 蒙山县| 子长县| 新河县| 辽中县|