標題: Titlebook: Blockchain and Trustworthy Systems; 4th International Co Davor Svetinovic,Yin Zhang,Xingping Chen Conference proceedings 2022 The Editor(s) [打印本頁] 作者: 營養(yǎng)品 時間: 2025-3-21 19:34
書目名稱Blockchain and Trustworthy Systems影響因子(影響力)
書目名稱Blockchain and Trustworthy Systems影響因子(影響力)學科排名
書目名稱Blockchain and Trustworthy Systems網(wǎng)絡公開度
書目名稱Blockchain and Trustworthy Systems網(wǎng)絡公開度學科排名
書目名稱Blockchain and Trustworthy Systems被引頻次
書目名稱Blockchain and Trustworthy Systems被引頻次學科排名
書目名稱Blockchain and Trustworthy Systems年度引用
書目名稱Blockchain and Trustworthy Systems年度引用學科排名
書目名稱Blockchain and Trustworthy Systems讀者反饋
書目名稱Blockchain and Trustworthy Systems讀者反饋學科排名
作者: 健談的人 時間: 2025-3-21 23:41
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/189234.jpg作者: Small-Intestine 時間: 2025-3-22 03:58 作者: AGONY 時間: 2025-3-22 06:32
https://doi.org/10.1007/978-3-642-96900-3t to maintain the records. Thus, the blockchain technology has been introduced to achieve automatic management of credit bank. Unfortunately, the immutable nature of blockchain makes it impossible for students to delete their private data when they leave, which would bring data leakage risks. As an 作者: 貧困 時間: 2025-3-22 10:33
Lexikon der deutschen Familienunternehmen and mobile networks, promoting the fusion of human society, information space, and the physical world and the development of the human-cyber-physical (HCP) environment. In the HCP environment, applications usually need to use heterogeneous resources belonging to multiple systems and participants. T作者: 沒收 時間: 2025-3-22 13:44 作者: PLUMP 時間: 2025-3-22 17:20
https://doi.org/10.1007/978-3-7091-3464-1applications usually leverage blockchain oracles to access off-chain data. However, they are still threatened by the weakness of data authenticity as the external data source system may be attacked and provide forged and malicious data. In this paper, we propose DataAttest, a framework based on remo作者: 雄偉 時間: 2025-3-22 22:27
https://doi.org/10.1007/978-3-7091-2169-6ns, such as healthcare and medicine industry. However, in real-world scenarios of healthcare and medicine applications, data sharing and service are confronted with some challenges because the data has the characteristics of multi-source, heterogeneity, large-scale, etc. Moreover, security and manag作者: reptile 時間: 2025-3-23 05:06 作者: 虛構的東西 時間: 2025-3-23 09:24
https://doi.org/10.1007/978-3-7091-2172-6ed access control methods have shortcomings such as single point of failure, low scalability, low availability and low non-repudiation. When using blockchain technology for access control, it is necessary to consider how to use the characteristics of blockchain to solve the problem of centralized ac作者: Epithelium 時間: 2025-3-23 12:48
Lexikon der Fertigungsleittechnikiew of the applications and regulations of blockchain-based stablecoins, which not only provides a clear view of current development but also has important referential value for guiding regulatory strategies. We begin with a new categorization perspective based on the legal position, the stability m作者: irritation 時間: 2025-3-23 15:33
Wolfgang Wenzel,Margarete J. Amannf Stake (DPoS) selects the witness nodes to produce blocks by voting, leading to the quick confirmation of transactions. As one of the widely used consensus mechanisms in public blockchain, DPoS is still threatened by attacks. In this paper, an analysis method for collusion attacks of DPoS consensus作者: discord 時間: 2025-3-23 19:43 作者: intertwine 時間: 2025-3-24 02:05 作者: Guaff豪情痛飲 時間: 2025-3-24 03:27 作者: archetype 時間: 2025-3-24 09:06
978-981-19-8042-8The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 昏暗 時間: 2025-3-24 11:24 作者: 咆哮 時間: 2025-3-24 18:04 作者: Androgen 時間: 2025-3-24 20:51 作者: Atrium 時間: 2025-3-25 02:46 作者: ETHER 時間: 2025-3-25 03:36 作者: HARP 時間: 2025-3-25 11:22 作者: emission 時間: 2025-3-25 12:05 作者: choroid 時間: 2025-3-25 16:56
Blockchain-Based Healthcare and Medicine Data Sharing and Service Systemns, such as healthcare and medicine industry. However, in real-world scenarios of healthcare and medicine applications, data sharing and service are confronted with some challenges because the data has the characteristics of multi-source, heterogeneity, large-scale, etc. Moreover, security and manag作者: squander 時間: 2025-3-25 23:41 作者: Insul島 時間: 2025-3-26 02:09 作者: sinoatrial-node 時間: 2025-3-26 07:08 作者: condone 時間: 2025-3-26 09:30 作者: Antigen 時間: 2025-3-26 13:25 作者: 水汽 時間: 2025-3-26 17:38 作者: seduce 時間: 2025-3-26 21:22 作者: Repatriate 時間: 2025-3-27 04:31 作者: overwrought 時間: 2025-3-27 07:51 作者: Nonflammable 時間: 2025-3-27 11:22
DataAttest: A Framework to Attest Off-Chain Data AuthenticityDataAttest also adopts two optimization strategies to accelerate DAP verification and minimize the overhead brought by DAP construction. We implement DataAttest and evaluate it on a real-world system. The experimental results show that DataAttest can effectively check data authenticity and the overh作者: 巨碩 時間: 2025-3-27 13:53 作者: Intellectual 時間: 2025-3-27 20:34
Blockchain-Enabled Techniques for Energy Internet of Things: A Review field from the three technical dimensions of smart contract, consensus protocol, and cross-chain communication. In addition, we summarize the performance evaluation methods of the blockchain-based EIoT scheme. Furthermore, we discuss the challenges associated with blockchain technology in the field作者: 條約 時間: 2025-3-27 23:43
Collusion Attack Analysis and Detection of DPoS Consensus Mechanismpower index and Banzhaf power index in weighted voting games of DPoS, which calculated different values that DPoS suffered attacks during the voting phase. Experimental results show that collusion attacks in DPoS can be effectively detected by this method. In addition, the analysis results can furth作者: Fantasy 時間: 2025-3-28 04:07
Decentralized Blockchain Transaction Scheme Based on Digital Commitmente commitment can be directly updated in the encrypted state and relevant parameters do not need to be transported multiple times. The transaction scheme proposed in this paper is with better efficiency and provable security, which provides a novel idea for the secure transaction framework in the blo作者: 拱形面包 時間: 2025-3-28 07:42
Research on Abnormal Transaction Detection Method for Blockchainrmal nodes and non-abnormal nodes classification model is obtained. And the abnormal transactions of blockchain is detected by using the classification model. Experimental results show that compared with traditional algorithms such as logistic regression (LR), multi-layer perceptron (MLP) and linear作者: deface 時間: 2025-3-28 12:55
https://doi.org/10.1007/978-3-662-64800-1chain and decentralized storage network (DSN). The framework consists of two subsystems where the identity subsystem contains an extensible three-tier user identity model atop decentralized identity, and the agreement signing subsystem, empowered by the identity subsystem, DSN and several novel desi作者: Gastric 時間: 2025-3-28 16:44
https://doi.org/10.1007/978-3-642-96900-3al supervision, and allows secure and efficient deletion of student’s private data on the blockchain while ensuring the privacy data of students. Theoretical analysis and experiments show that the proposed scheme can effectively resist malicious behaviors and has practical performance.作者: adduction 時間: 2025-3-28 21:32 作者: Pedagogy 時間: 2025-3-28 23:01 作者: 按等級 時間: 2025-3-29 06:20
https://doi.org/10.1007/978-3-7091-2169-6for multi-source data integration and distributed data storage, a data management layer for data secure transfer and access, and a data application layer for various user-oriented services. Furthermore, several healthcare and medicine data sharing and service scenarios have been depicted in detail. 作者: Duodenitis 時間: 2025-3-29 07:28
https://doi.org/10.1007/978-3-7091-2172-6 field from the three technical dimensions of smart contract, consensus protocol, and cross-chain communication. In addition, we summarize the performance evaluation methods of the blockchain-based EIoT scheme. Furthermore, we discuss the challenges associated with blockchain technology in the field作者: separate 時間: 2025-3-29 12:35 作者: 是突襲 時間: 2025-3-29 18:03 作者: 巡回 時間: 2025-3-29 21:23 作者: 反感 時間: 2025-3-30 01:28 作者: 混沌 時間: 2025-3-30 05:47
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in th作者: acheon 時間: 2025-3-30 10:19
Latency Analysis for Raft Consensus on Hyperledger Fabric作者: 消音器 時間: 2025-3-30 13:23 作者: 公社 時間: 2025-3-30 20:34
https://doi.org/10.1007/978-3-7091-2172-6sonal information. User identity authentication is more complete, and the process of information data circulation is effectively achieved. Transparent. Simulation experiments show that the scheme can provide a fast, comprehensive and scalable access control mechanism.作者: Nmda-Receptor 時間: 2025-3-31 00:14 作者: 走路左晃右晃 時間: 2025-3-31 03:24 作者: 假裝是我 時間: 2025-3-31 08:30
A Survey of Blockchain-Based Stablecoin: Cryptocurrencies and Central Bank Digital Currenciesechanism, target user, and decentralization. Then, we investigate the technical application of real-world projects and analysis it comparatively. Further, we explore the different regulations technologies and policies of blockchain-based stablecoins. Finally, several unresolved difficulties and prospective future are discussed.作者: FLAIL 時間: 2025-3-31 09:31 作者: Evocative 時間: 2025-3-31 16:31 作者: Curmudgeon 時間: 2025-3-31 18:06