標(biāo)題: Titlebook: Blockchains; A Handbook on Fundam Sushmita Ruj,Salil S. Kanhere,Mauro Conti Book 2024 The Editor(s) (if applicable) and The Author(s), unde [打印本頁] 作者: 輕舟 時間: 2025-3-21 16:07
書目名稱Blockchains影響因子(影響力)
書目名稱Blockchains影響因子(影響力)學(xué)科排名
書目名稱Blockchains網(wǎng)絡(luò)公開度
書目名稱Blockchains網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Blockchains被引頻次
書目名稱Blockchains被引頻次學(xué)科排名
書目名稱Blockchains年度引用
書目名稱Blockchains年度引用學(xué)科排名
書目名稱Blockchains讀者反饋
書目名稱Blockchains讀者反饋學(xué)科排名
作者: 容易生皺紋 時間: 2025-3-21 20:31 作者: 極少 時間: 2025-3-22 02:54 作者: Subdue 時間: 2025-3-22 05:15
The Ethereum Blockchain: Implementation and Security Aspectserabilities and security issues related to all the presented building blocks of Ethereum. Our aim is to provide a clear state-of-the-art overview of both the implementation aspects and security of the Ethereum blockchain.作者: 有惡意 時間: 2025-3-22 10:51
Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies. Based on this assessment of the current state of (unwanted) blockchain content, we discuss (a) countermeasures to mitigate its insertion, (b) how pruning blockchains relates to this issue, and (c) how strategically weakening the otherwise desired immutability of a blockchain allows for redacting o作者: Accessible 時間: 2025-3-22 14:28 作者: 百靈鳥 時間: 2025-3-22 18:20
Blockchain Technology for E-Governance Applicationsckend or as mediation platforms have received traction as evidenced by multiple pilots by various governments worldwide. The National Blockchain Project at the Indian Institute of Technology Kanpur has been funded by the Government of India to develop technology and solutions for various E-Governanc作者: 返老還童 時間: 2025-3-22 22:02
Decentralized Identity Management and Blockchains: Design Patterns and Architecturesis formed and shared with others, without having to rely on a centralised identity provider. A distributed ledger technology like blockchain can play a vital role in the design and implementation of a decentralised identity management scheme. Indeed, a decentralised identity management scheme such a作者: adjacent 時間: 2025-3-23 01:52 作者: Audiometry 時間: 2025-3-23 09:10 作者: MUTED 時間: 2025-3-23 11:06 作者: 外來 時間: 2025-3-23 13:53
Lie Groups and Algebras: Matrix Approacherabilities and security issues related to all the presented building blocks of Ethereum. Our aim is to provide a clear state-of-the-art overview of both the implementation aspects and security of the Ethereum blockchain.作者: flutter 時間: 2025-3-23 22:00 作者: 橫截,橫斷 時間: 2025-3-23 23:35
Josephine C. Adams,Jürgen Engelarency, immutability, secure anonymity, and auditability, make it a suitable solution to address DF’s new challenges. To this end, we provide a compact survey on state-of-the-art blockchain-based DF investigation techniques along with their advantages and disadvantages. We will discuss all critical 作者: 受辱 時間: 2025-3-24 03:53
Life and Job Satisfaction in Chinackend or as mediation platforms have received traction as evidenced by multiple pilots by various governments worldwide. The National Blockchain Project at the Indian Institute of Technology Kanpur has been funded by the Government of India to develop technology and solutions for various E-Governanc作者: chastise 時間: 2025-3-24 06:31
Life and Labour in Rural England, 1760–1850is formed and shared with others, without having to rely on a centralised identity provider. A distributed ledger technology like blockchain can play a vital role in the design and implementation of a decentralised identity management scheme. Indeed, a decentralised identity management scheme such a作者: athlete’s-foot 時間: 2025-3-24 10:42 作者: 油膏 時間: 2025-3-24 18:39
Cryptographic Primitiveschallenges. Some of the main challenges in the blockchain are smart contract management, key management, and further improvements in security, privacy, and scalability. These challenges can be addressed by leveraging suitable and efficient cryptographic primitives. Therefore, this chapter aims to in作者: Intact 時間: 2025-3-24 23:03
Bitcoin Blockchain System: An Overview of Security and Privacy Aspectsfluenced many other application areas (e.g., healthcare, supply-chain management, real estate) with its underlying technologies such as blockchain, consensus algorithms, and decentralized data management. Due to the reasons mentioned above, Bitcoin has attracted massive attention from the research c作者: anniversary 時間: 2025-3-25 00:27
The Ethereum Blockchain: Implementation and Security Aspectsentative the Bitcoin, the Ethereum blockchain extends the applications of this technology to domains such as its transfer of information and inclusion of off-chain data inside the blockchain. Furthermore, with the introduction of smart contracts, Ethereum allows for the automatic execution of operat作者: Ataxia 時間: 2025-3-25 03:57 作者: Diatribe 時間: 2025-3-25 11:26
Algorand Blockchaintocol where each round of the protocol consists of several steps and each step is executed by a subset of users. Algorand is a . blockchain meaning that the number of . tokens in each user’s account determines the probability that the user is selected to take part in each step of the protocol. This 作者: CROAK 時間: 2025-3-25 14:49 作者: 星球的光亮度 時間: 2025-3-25 19:34
The Security of Delegated Proof-of-Stake Wallet and Stake Poolscture, achieving similar security properties of the proof-of-work paradigm without the drawback of centralization risks and energy high costs and, at the same time, allowing a richer and more complex system, where spending transactions are not the only transactions. For example, it allows the ., or 作者: engagement 時間: 2025-3-25 21:15 作者: 現(xiàn)存 時間: 2025-3-26 04:09
Illicit Blockchain Content: Its Different Shapes, Consequences, and Remediesing parties. However, new risks emerge at the same time when illegal content is added. This chapter thus provides a holistic overview of the risks of content insertion as well as proposed countermeasures. We first establish a simple framework for how content is added to the blockchain and subsequent作者: 興奮過度 時間: 2025-3-26 05:17 作者: Nuance 時間: 2025-3-26 10:07
Supply Chain Management Using Blockchainstrictions spanning geographic boundaries, as well as they often demand greater transparency and trust. Blockchain technology can transform supply chains by enhancing trust, improving efficiency, and enabling regulatory compliance. This chapter discusses challenges related to the adoption of blockch作者: BARGE 時間: 2025-3-26 14:59
Blockchain Technology for E-Governance Applicationstists, policy makers, and governments alike. The continuous evolution of blockchain technology from generation 1.0 to 3.0 has brought forth multiple powerful platforms for creating trust among mistrusting entities, the ability to automate transactions through smart contracts, and multiple customized作者: 導(dǎo)師 時間: 2025-3-26 19:18 作者: 催眠 時間: 2025-3-27 00:19 作者: Meditative 時間: 2025-3-27 05:03
https://doi.org/10.1007/978-3-031-32146-7Blockchain; Cryptocurrencies; Security; Privacy; Trust; Bitcoin; Ethereum; Distributed Computing; Scalabilit作者: HALL 時間: 2025-3-27 06:23 作者: 燈絲 時間: 2025-3-27 12:22
Sushmita Ruj,Salil S. Kanhere,Mauro ContiA comprehensive book that presents both fundamental concepts and applications in blockchain.Discusses popular blockchain designs and platforms.Presents various security and privacy issues of blockchai作者: 凌辱 時間: 2025-3-27 15:22 作者: regale 時間: 2025-3-27 19:17
Blockchains978-3-031-32146-7Series ISSN 1568-2633 Series E-ISSN 2512-2193 作者: 極大的痛苦 時間: 2025-3-28 00:53
Lie Groups and Algebras: Matrix Approach industries and their use-cases have already demonstrated the potential of such applications. Interestingly, these technologies rely on a large body of complex research topics like the Byzantine consensus problem. Although such problem was defined four decades ago, its subtle ramifications are large作者: MEEK 時間: 2025-3-28 04:07 作者: Exposure 時間: 2025-3-28 06:43
Structure of Semi-Simple Lie Algebrasfluenced many other application areas (e.g., healthcare, supply-chain management, real estate) with its underlying technologies such as blockchain, consensus algorithms, and decentralized data management. Due to the reasons mentioned above, Bitcoin has attracted massive attention from the research c作者: DEMN 時間: 2025-3-28 13:31
Lie Groups and Algebras: Matrix Approachentative the Bitcoin, the Ethereum blockchain extends the applications of this technology to domains such as its transfer of information and inclusion of off-chain data inside the blockchain. Furthermore, with the introduction of smart contracts, Ethereum allows for the automatic execution of operat作者: 暫時別動 時間: 2025-3-28 17:06
Lie Groups and Algebras: Matrix Approachon (RingCT) protocol, which is currently used in the largest cryptocurrency Monero. Our future enhancements include the shortening of the size significantly, from linear to logarithm to the number of possible senders of the transaction. Another cutting-edge enhancement is to provide post-quantum sec作者: alliance 時間: 2025-3-28 19:23 作者: projectile 時間: 2025-3-29 02:12 作者: Ceremony 時間: 2025-3-29 04:57 作者: 檔案 時間: 2025-3-29 10:25 作者: 彩色的蠟筆 時間: 2025-3-29 11:56
Lorenzo Baravalle,Luciana Zaterkaing parties. However, new risks emerge at the same time when illegal content is added. This chapter thus provides a holistic overview of the risks of content insertion as well as proposed countermeasures. We first establish a simple framework for how content is added to the blockchain and subsequent作者: vascular 時間: 2025-3-29 16:21
Josephine C. Adams,Jürgen Engelects of crimes. Therefore, a secure and efficient evidence management system should have certain features such as tamper-resistant, traceability, auditability, privacy preservation, and fine-grained access control. Unfortunately, the state-of-the-art DF is facing new challenges due to the recent tec作者: 豐滿中國 時間: 2025-3-29 23:05 作者: GEAR 時間: 2025-3-30 03:39
Life and Job Satisfaction in Chinatists, policy makers, and governments alike. The continuous evolution of blockchain technology from generation 1.0 to 3.0 has brought forth multiple powerful platforms for creating trust among mistrusting entities, the ability to automate transactions through smart contracts, and multiple customized作者: leniency 時間: 2025-3-30 06:36 作者: 辯論 時間: 2025-3-30 11:16
Life and Labour in Rural England, 1760–1850pt of digital identity goes beyond just providing a credential for logins. A truly effective digital identity scheme should be able to model the observations that people, throughout their life, tend to carry many different senses of “identities” (or personas) and each identity is fused with differen作者: 刺耳 時間: 2025-3-30 14:05
1568-2633 ms.Presents various security and privacy issues of blockchaiThis handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptogra作者: Cupidity 時間: 2025-3-30 17:40
Lie Groups and Algebras: Matrix Approachcantly, from linear to logarithm to the number of possible senders of the transaction. Another cutting-edge enhancement is to provide post-quantum security to the whole RingCT protocol, by using lattice-based cryptography to redesign all algorithms.作者: compel 時間: 2025-3-30 22:54 作者: NOT 時間: 2025-3-31 04:52
Alejandro Rosas,Juan Diego Moraless class of solutions is known as layer 2 solutions. We discuss the motivation of layer 2 scaling solutions and various types of layer 2 scaling solutions. We discuss payment channel networks in details.作者: reptile 時間: 2025-3-31 07:30
The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchaincantly, from linear to logarithm to the number of possible senders of the transaction. Another cutting-edge enhancement is to provide post-quantum security to the whole RingCT protocol, by using lattice-based cryptography to redesign all algorithms.作者: 專橫 時間: 2025-3-31 12:58