Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 4, Issue 2June 2024Current Issue
Reflects downloads up to 03 Oct 2024Bibliometrics
Skip Table Of Content Section
review-article
Open Access
Blockchain for finance: A survey
Abstract

As an innovative technology for enhancing authenticity, security, and risk management, blockchain is being widely adopted in trade and finance systems. The unique capabilities of blockchain, such as immutability and transparency, enable new ...

This paper pictures the current blockchain ecosystem in finance. It summarizes the challenges of the current blockchain applications in the global financial sector and provides an implementation proposal about a new blockchain‐based financial ...

review-article
Open Access
A survey on blockchain deployment for biometric systems
Abstract

Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, ...

The purpose of this work is to investigate blockchain‐based biometric applications to benefit the government, people, and businesses boosting the level of privacy and security. Blockchain properties can enhance conventional biometric systems for the ...

research-article
Open Access
Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing
Abstract

Privacy concerns the majority of individuals, governments, and organizations that share data over dissimilar networks of nodes. Every kind of participant requires awareness of the data journey that unfolds inside a blockchain network with its ...

This article presents significant blockchain aspects respecting privacy impact on data sharing. It argues on the essential mutual exclusivity between the blockchain properties of privacy and transparency and provides a high‐level architecture configuring ...

research-article
Open Access
Non‐fungible token‐based health record marketplace
Abstract

With an increasing affinity towards patient‐centric care, sharing real‐time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the ...

In this work, a non‐fungible token‐based system is proposed to implement a health record marketplace, which provides dual ownership along with finer access control and efficiency in data sharing. Stackelberg game theory is utilized to determine pricing ...

research-article
Open Access
Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification
Abstract

Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi ...

A novel approach called PZ‐C1DZ3, which combines formal verification with one‐dimensional convolutional neural networks (CNNs) based on opcode for Ponzi scheme detection, is proposed. Four types of machine learning models, namely Conv1D, Conv1D‐LSTM, ...

research-article
Open Access
Multi‐hop anonymous payment channel network based on onion routing
Abstract

Payment channel networks (PCNs) are one of the most promising off‐chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path ...

To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme ...

research-article
Open Access
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator
Abstract

Most blockchain users run light nodes on mobile devices. Due to limited storage and computation, light nodes cannot perform transaction validation. This shortage makes opportunities for malicious nodes to produce blocks containing invalid ...

We present SVST, a block extension architecture designed to enhance the efficiency of transaction history retrieval and reduce storage requirements for transaction validation. By leveraging SVST, we introduce ISTVP, a high‐level verification protocol ...

Comments