To see the other types of publications on this topic, follow the link: Bitcore Node.

Journal articles on the topic 'Bitcore Node'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Bitcore Node.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.

Full text
Abstract:
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a
APA, Harvard, Vancouver, ISO, and other styles
2

Pazmiño, Juan Eduardo, and Carlo Kleber da Silva Rodrigues. "Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time." SIJ Transactions on Computer Networks & Communication Engineering 03, no. 01 (2015): 01–05. http://dx.doi.org/10.9756/sijcnce/v3i1/03020020101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Haija, Qasem Abu, and Abdulaziz A. Alsulami. "High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks." Electronics 10, no. 17 (2021): 2113. http://dx.doi.org/10.3390/electronics10172113.

Full text
Abstract:
The Bitcoin cryptocurrency is a worldwide prevalent virtualized digital currency conceptualized in 2008 as a distributed transactions system. Bitcoin transactions make use of peer-to-peer network nodes without a third-party intermediary, and the transactions can be verified by the node. Although Bitcoin networks have exhibited high efficiency in the financial transaction systems, their payment transactions are vulnerable to several ransomware attacks. For that reason, investigators have been working on developing ransomware payment identification techniques for bitcoin transactions’ networks t
APA, Harvard, Vancouver, ISO, and other styles
4

Schreiber, Zvi. "k-Root-n: An Efficient Algorithm for Avoiding Short Term Double-Spending Alongside Distributed Ledger Technologies such as Blockchain." Information 11, no. 2 (2020): 90. http://dx.doi.org/10.3390/info11020090.

Full text
Abstract:
Blockchains such as the bitcoin blockchain depend on reaching a global consensus on the distributed ledger; therefore, they suffer from well-known scalability problems. This paper proposes an algorithm that avoids double-spending in the short term with just O(√n) messages instead of O(n); each node receiving money off-chain performs the due diligence of consulting k√n random nodes to check if any of them is aware of double-spending. Two nodes receiving double-spent money will in this way consult at least one common node with very high probability, because of the ‘birthday paradox’, and any com
APA, Harvard, Vancouver, ISO, and other styles
5

Ge, Lin, and Tao Jiang. "A Privacy Protection Method of Lightweight Nodes in Blockchain." Security and Communication Networks 2021 (July 15, 2021): 1–17. http://dx.doi.org/10.1155/2021/2067137.

Full text
Abstract:
Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new privacy protection method. Considering the superimposition effect of query information, node and Bloom filter are regarded as the two parties of the game. A privacy protection mechanism based on the mixed strategy Nash equilibrium is proposed to judge the information query. On this basis, a Bloom filter privacy protection algorithm is proposed when the probability of information query and privacy, not being leaked, is less than the node privacy protection. It is based on variab
APA, Harvard, Vancouver, ISO, and other styles
6

Motlagh, Saeideh G., Jelena Misic, and Vojislav B. Misic. "Impact of Node Churn in the Bitcoin Network." IEEE Transactions on Network Science and Engineering 7, no. 3 (2020): 2104–13. http://dx.doi.org/10.1109/tnse.2020.2974739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Jiangdong, and Wei Cao. "Bitcoin mining, the way to process transaction information or the way to make money?" INSIST 4, no. 1 (2019): 191. http://dx.doi.org/10.23960/ins.v4i1.191.

Full text
Abstract:
Bitcoin is a crypto currency introduced by Satoshi Nakamoto in 2008. It has the features of decentralization cross-border and fixed total amount and has become one of the most widely used crypto-currencies. Bitcoin, as a new digital currency system, innovatively makes the use of cryptographic elements and consensus mechanisms and builds up a secure decentralized system. The Blockchain, as the core of Bitcoin, uses peer-to-peer network communications and backs up transaction data in every node of the system, thus creating a huge distributed public book. It is essentially a decentralized distrib
APA, Harvard, Vancouver, ISO, and other styles
8

Zize, Zhang. "Analysis on Criminal Governance of Bitcoin-related Corruption Cases." Economics, Law and Policy 4, no. 1 (2021): p37. http://dx.doi.org/10.22158/elp.v4n1p37.

Full text
Abstract:
Bitcoin is extremely easy to be used in corruption cases due to its pseudonym, easy circulation, easy cross-border and other characteristics. As a decentralized electronic account book, the circulation of regulatory funds is jointly confirmed by each node in the bitcoin network, which can ensure the authenticity of the criminal evidence and is not easy to be lost or damaged. It provides great convenience for evidence collection in bitcoin corruption cases. However, there are also shackles in criminal governance, such as how to prove the subjective intent of the bribe takers, the impact of fluc
APA, Harvard, Vancouver, ISO, and other styles
9

Oggier, Frédérique, Silivanxay Phetsouvanh, and Anwitaman Datta. "A split-and-transfer flow based entropic centrality." PeerJ Computer Science 5 (September 16, 2019): e220. http://dx.doi.org/10.7717/peerj-cs.220.

Full text
Abstract:
The notion of entropic centrality measures how central a node is in terms of how uncertain the destination of a flow starting at this node is: the more uncertain the destination, the more well connected and thus central the node is deemed. This implicitly assumes that the flow is indivisible, and at every node, the flow is transferred from one edge to another. The contribution of this paper is to propose a split-and-transfer flow model for entropic centrality, where at every node, the flow can actually be arbitrarily split across choices of neighbours. We show how to map this to an equivalent
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.

Full text
Abstract:
AbstractThe Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind. Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bitcoin nodes to obtain its transaction history and the current approaches offer no privacy guarantees to the SPV clients.This work presents T3, a trusted hardware-secured Bitcoin full client th
APA, Harvard, Vancouver, ISO, and other styles
11

Turner, Adam, and Angela Samantha Maitland Irwin. "Bitcoin transactions: a digital discovery of illicit activity on the blockchain." Journal of Financial Crime 25, no. 1 (2018): 109–30. http://dx.doi.org/10.1108/jfc-12-2016-0078.

Full text
Abstract:
Purpose The purpose of this paper is to determine if Bitcoin transactions could be de-anonymised by analysing the Bitcoin blockchain and transactions conducted through the blockchain. In addition, graph analysis and the use of modern social media technology were examined to determine how they may help reveal the identity of Bitcoin users. A review of machine learning techniques and heuristics was carried out to learn how certain behaviours from the Bitcoin network could be augmented with social media technology and other data to identify illicit transactions. Design/methodology/approach A numb
APA, Harvard, Vancouver, ISO, and other styles
12

Yao, Yuhang, Xiao Zeng, Tianyue Cao, Luoyi Fu, and Xinbing Wang. "APRP: An Anonymous Propagation Method in Bitcoin Network." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 10073–74. http://dx.doi.org/10.1609/aaai.v33i01.330110073.

Full text
Abstract:
Due to little attention given to anonymous protection against eavesdropping attacks in Bitcoin network, this paper initiatively proposes a solution to Bitcoin anonymization based on network structure. We first present a general adversarial network model for formulizing deanonymization attack, then present a novel propagation method APRP(Adaptive PageRank Propagation) that adopts PageRank as propagation delay factor and constantly adjusts PR-value of nodes to adapt to network dynamics. Experiments on both simulated and real Bitcoin networks confirm the superiority of APRP in terms of 20-50% per
APA, Harvard, Vancouver, ISO, and other styles
13

Park, Youngho, Chul Sur, and Kyung-Hyune Rhee. "A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency." Security and Communication Networks 2018 (July 8, 2018): 1–13. http://dx.doi.org/10.1155/2018/5932183.

Full text
Abstract:
One remarkable feature of vehicular ad hoc networks is characterized by an opportunistic communications by means of store-carry-forward message relaying which requires the cooperation of vehicles on the networks. However, we cannot be sure that all vehicles willingly contribute their computing resources to the networks for message forwarding with no rewards for their efforts in real-world scenarios. In addition, unfortunately, there may exist some selfish and greedy node which may not help others but tend to take their own gain. To cope with this challenge, incentive mechanisms are generally c
APA, Harvard, Vancouver, ISO, and other styles
14

Houy, Nicolas. "The Bitcoin Mining Game." Ledger 1 (December 21, 2016): 53–68. http://dx.doi.org/10.5195/ledger.2016.13.

Full text
Abstract:
This article deals with the mining incentives in the Bitcoin protocol. The mining process is used to confirm and secure transactions. This process is organized as a speed game between individuals or firms – the miners – with different computational powers to solve a mathematical problem, bring a proof of work, spread their solution and reach consensus among the Bitcoin network nodes with it. First, we define and specify this game. Second, we analytically find its Nash equilibria in the two-player case. We analyze the parameters for which the miners would face the proper incentives to fulfill t
APA, Harvard, Vancouver, ISO, and other styles
15

Burchert, Conrad, Christian Decker, and Roger Wattenhofer. "Scalable funding of Bitcoin micropayment channel networks." Royal Society Open Science 5, no. 8 (2018): 180089. http://dx.doi.org/10.1098/rsos.180089.

Full text
Abstract:
The Bitcoin network has scalability problems. To increase its transaction rate and speed, micropayment channel networks have been proposed; however, these require to lock funds into specific channels. Moreover, the available space in the blockchain does not allow scaling to a worldwide payment system. We propose a new layer that sits in between the blockchain and the payment channels. The new layer addresses the scalability problem by enabling trustless off-blockchain channel funding. It consists of shared accounts of groups of nodes that flexibly create one-to-one channels for the payment net
APA, Harvard, Vancouver, ISO, and other styles
16

Longo, Riccardo, Alessandro Sebastian Podda, and Roberto Saia. "Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain." Computation 8, no. 3 (2020): 67. http://dx.doi.org/10.3390/computation8030067.

Full text
Abstract:
Currently, an increasing number of third-party applications exploit the Bitcoin blockchain to store tamper-proof records of their executions, immutably. For this purpose, they leverage the few extra bytes available for encoding custom metadata in Bitcoin transactions. A sequence of records of the same application can thus be abstracted as a stand-alone subchain inside the Bitcoin blockchain. However, several existing approaches do not make any assumptions about the consistency of their subchains, either (i) neglecting the possibility that this sequence of messages can be altered, mainly due to
APA, Harvard, Vancouver, ISO, and other styles
17

Pagalla Bhavani Shankar. "Blockchain: The Essential Future of Modern Internet." International Journal for Modern Trends in Science and Technology 6, no. 10 (2020): 60–64. http://dx.doi.org/10.46501/ijmtst061011.

Full text
Abstract:
This paper deals with the future of modern internet, named as “Blockchain”. Blockchain is renowned as the worlds populating a type of new software platform for all kinds of digital assets. In a form of, forms of blocks data will be stored or recorded in blockchain, and emerged & protected and secured by the conceptual of Cryptography. After release of bitcoin, the “Modern Internet : Blockchain” became a high peak internet protocol , which is transforming the values of data from a node to node in a block and working in a decentralized manner. Blockchain is a state of art technology that is
APA, Harvard, Vancouver, ISO, and other styles
18

Park, Sehyun, Seongwon Im, Youhwan Seol, and Jeongyeup Paek. "Nodes in the Bitcoin Network: Comparative Measurement Study and Survey." IEEE Access 7 (2019): 57009–22. http://dx.doi.org/10.1109/access.2019.2914098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Maram, Balajee. "Bitcoin Generation using Blockchain Technology." JOIV : International Journal on Informatics Visualization 2, no. 3 (2018): 127. http://dx.doi.org/10.30630/joiv.2.3.109.

Full text
Abstract:
There are limitations in client-server model of communication. Distributed architecture provides good accessibility to all the nodes in the network. A blockchain technology is follows distributed model. In the digital era, all the transactions are available in the digital form is called a ledger. This ledger belongs to all the users in the network are shared by all the users in the network. Every transaction is monitored and verified by every user in the network. The blockchain is a chain of blocks that contains a collection of transactions. Bitcoin is a cryptocurrency, depends on blockchain t
APA, Harvard, Vancouver, ISO, and other styles
20

Berdugo, Liat Rachel, and Emily Martinez. "Seeing Blocks and Crypto Bros." Media-N 16, no. 1 (2020): 79–98. http://dx.doi.org/10.21900/j.median.v16i1.225.

Full text
Abstract:
How do cryptocurrencies like Bitcoin work? What is a blockchain? And, what does a typical Bitcoin holder look like? The artist collective Anxious to Make commissioned sixty cloudworkers to draw their answers to these questions. Drawings range from the mundane and stereotypical—a Bitcoin owner depicted as a bearded hipster shouting, HODL!—to the complex and eccentric—the blockchain drawn as connected nodes of random numbers, presumably meant to represent cryptographic hashes. 
 Like much technology, the inner workings of cryptocurrency remain “black boxes” of understanding to most users. A
APA, Harvard, Vancouver, ISO, and other styles
21

Nabilou, Hossein. "How to regulate bitcoin? Decentralized regulation for a decentralized cryptocurrency." International Journal of Law and Information Technology 27, no. 3 (2019): 266–91. http://dx.doi.org/10.1093/ijlit/eaz008.

Full text
Abstract:
Abstract Bitcoin is a distributed system. The dilemma it poses to the legal systems is that it is hardly possible to regulate a distributed network in a centralized fashion, as decentralized cryptocurrencies are antithetical to the existing centralized structure of monetary and financial regulation. This article proposes a more nuanced policy recommendation for regulatory intervention in the cryptocurrency ecosystem, which relies on a decentralized regulatory architecture built upon the existing regulatory infrastructure and makes use of the existing and emerging middlemen. It argues that inst
APA, Harvard, Vancouver, ISO, and other styles
22

Chapnevis, Amirahmad, Abouzar Arabsorkhi, and Tala Tafazzoli. "An automated method for detecting suspicious nodes in Bitcoin address graph." International Journal of Security and Networks 1, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijsn.2020.10039019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Zhen, Bing Guo, Yan Shen, Chengjie Li, Xinhua Suo, and Hong Su. "Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing." Security and Communication Networks 2021 (March 11, 2021): 1–11. http://dx.doi.org/10.1155/2021/6629433.

Full text
Abstract:
Bitcoin mining consumes tremendous amounts of electricity to solve the hash problem. At the same time, large-scale applications of artificial intelligence (AI) require efficient and secure computing. There are many computing devices in use, and the hardware resources are highly heterogeneous. This means a cooperation mechanism is needed to realize cooperation among computing devices, and a good calculation structure is required in the case of data dispersion. In this paper, we propose an architecture where devices (also called nodes) can reach a consensus on task results using off-chain smart
APA, Harvard, Vancouver, ISO, and other styles
24

Wu, Nannan, Wenjun Wang, Feng Chen, Jianxin Li, Bo Li, and Jinpeng Huai. "Uncovering Specific-Shape Graph Anomalies in Attributed Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 5433–40. http://dx.doi.org/10.1609/aaai.v33i01.33015433.

Full text
Abstract:
As networks are ubiquitous in the modern era, point anomalies have been changed to graph anomalies in terms of anomaly shapes. However, the specific-shape priors about anomalous subgraphs of interest are seldom considered by the traditional approaches when detecting the subgraphs in attributed graphs (e.g., computer networks, Bitcoin networks, and etc.). This paper proposes a nonlinear approach to specific-shape graph anomaly detection. The nonlinear approach focuses on optimizing a broad class of nonlinear cost functions via specific-shape constraints in attributed graphs. Our approach can be
APA, Harvard, Vancouver, ISO, and other styles
25

Motlagh, Saeideh G., Jelena Mišić, and Vojislav B. Mišić. "An analytical model for churn process in Bitcoin network with ordinary and relay nodes." Peer-to-Peer Networking and Applications 13, no. 6 (2020): 1931–42. http://dx.doi.org/10.1007/s12083-020-00953-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Misic, Jelena, Vojislav B. Misic, and Xiaolin Chang. "Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks." IEEE Transactions on Network Science and Engineering 7, no. 4 (2020): 3135–47. http://dx.doi.org/10.1109/tnse.2020.3017453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Heo, Hwanjo, and Seungwon Shin. "Understanding Block and Transaction Logs of Permissionless Blockchain Networks." Security and Communication Networks 2021 (August 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/9549602.

Full text
Abstract:
Public blockchain records are widely studied in various aspects such as cryptocurrency abuse, anti-money-laundering, and monetary flow of businesses. However, the final blockchain records, usually available from block explorer services or querying locally stored data of blockchain nodes, do not provide abundant and dynamic event logs that are only visible from a live large-scale measurement. In this paper, we collect the network logs of three popular permissionless blockchains, that is, Bitcoin, Ethereum, and EOS. The discrepancy between observed events and the public block data is studied via
APA, Harvard, Vancouver, ISO, and other styles
28

Nowostawski, Mariusz, and Jardar Tøn. "Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network." Applied Sciences 9, no. 12 (2019): 2519. http://dx.doi.org/10.3390/app9122519.

Full text
Abstract:
Payment channels and off-chain transactions are used to address blockchain scalability. Those mechanisms rely on the blockchain proper, as the resolution mechanism. They allow for high transaction throughput due to the pure peer-to-peer nature of the transaction exchange that happens directly between the peers, without the involvement of the blockchain transactions. The transactions are not mediated through the blockchain but happen off-chain. The transactions in such overlay networks are not included in the blockchain, they nevertheless leave some data traces in a public ledger. We have used
APA, Harvard, Vancouver, ISO, and other styles
29

Derbentsev, Vasily D., Vitalii S. Bezkorovainyi, and Iryna V. Luniak. "Application of Deep Learning Methods to Forecasting Changes in Short-Term Currency Trends." Scientific Bulletin of Mukachevo State University Series “Economics” 7, no. 2 (2020): 75–86. http://dx.doi.org/10.52566/msu-econ.7(2).2020.75-86.

Full text
Abstract:
This study investigates the issues of forecasting changes in short-term currency trends using deep learning models, which is relevant for both the scientific community and for traders and investors. The purpose of this study is to build a model for forecasting the direction of change in the prices of currency quotes based on deep neural networks. The developed architecture was based on the model of valve recurrent node, which is a modification of the model of “Long Short-Term Memory”, but is simpler in terms of the number of parameters and learning time. The forecast calculations of the dynami
APA, Harvard, Vancouver, ISO, and other styles
30

Ferreira, Micael, Sven Rodrigues, Catarina Reis, and Marisa Maximiano. "Blockchain: A Tale of Two Applications." Applied Sciences 8, no. 9 (2018): 1506. http://dx.doi.org/10.3390/app8091506.

Full text
Abstract:
Bitcoin continues to get more and more attention from the media, mainly because of the volatility of its value and insignificantly associated with the technological innovation. This cryptocurrency is supported by an immutable database and is distributed throughout a network of thousands of nodes, known as Blockchain. One way to ensure that all the concepts behind the Blockchain technology and infrastructure are seized is to conduct the development of one of the most popular context applications for it: a wallet for well-known cryptocurrencies. Yet Another Bitcoin Wallet (YABW) is a hybrid appl
APA, Harvard, Vancouver, ISO, and other styles
31

Shevchuk, Oksana, and Natalia Mentuh. "MAIN MECHANISMS OF MONETARY POLICY IMPLEMENTATION AND THEIR FEATURES." Scientific Notes Series Law 1, no. 9 (2020): 115–21. http://dx.doi.org/10.36550/2522-9230-2020-1-9-115-121.

Full text
Abstract:
This scientific article is devoted to the analysis of theoretical principles, legislation, scientific positions on improving the priorities and mechanisms of monetary policy in the national financial security system. The purpose of the study is to strengthen the process of national financial security. The subject of the study is to identify key points in the national financial security system and the implementation of theoretical and methodological principles, as well as scientific and practical recommendations for the implementation of mechanisms to improve monetary policy. The conceptual pro
APA, Harvard, Vancouver, ISO, and other styles
32

Wright, Keith. "The Case for a Technology Solution to the Ethics Crisis in Academic Publishing." International Journal of Technoethics 12, no. 1 (2021): 1–20. http://dx.doi.org/10.4018/ijt.2021010101.

Full text
Abstract:
This article integrates existing theory from distributed computing and cryptology with gray literature from industry to provide a comprehensive description of the minimum requirements of a technological solution to the current ethics crisis in academic publishing. The paper argues that such a solution could significantly reduce the biases and misconduct that now exist in the academic peer review process. Theory suggests such a system could operate effectively as a distributed encrypted telecommunications network where nodes are anonymous, do not trust each other, with minimal central authority
APA, Harvard, Vancouver, ISO, and other styles
33

Momoh, Muyideen Omuya, P. U. Chinedu, W. Nwankwo, D. Aliu, and M. S. Shaba. "BLOCKCHAIN ADOPTION: APPLICATIONS AND CHALLENGES." International Journal of Software Engineering and Computer Systems 7, no. 2 (2021): 19–25. http://dx.doi.org/10.15282/ijsecs.7.2.2021.3.0086.

Full text
Abstract:
In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first appli
APA, Harvard, Vancouver, ISO, and other styles
34

Christodoulou, Klitos, Elias Iosif, Antonios Inglezakis, and Marinos Themistocleous. "Consensus Crash Testing: Exploring Ripple’s Decentralization Degree in Adversarial Environments." Future Internet 12, no. 3 (2020): 53. http://dx.doi.org/10.3390/fi12030053.

Full text
Abstract:
The inception of Bitcoin as a peer-to-peer payment system, and its underlying blockchain data-structure and protocol, has led to an increased interest in deploying scalable and reliable distributed-ledger systems that build on robust consensus protocols. A critical requirement of such systems is to provide enough fault tolerance in the presence of adversarial attacks or network faults. This is essential to guarantee liveness when the network does not behave as expected and ensure that the underlying nodes agree on a unique order of transactions over a shared state. In comparison with tradition
APA, Harvard, Vancouver, ISO, and other styles
35

Lundbæk, Leif-Nissen, Daniel Janes Beutel, Michael Huth, Stephen Jackson, Laurence Kirk, and Robert Steiner. "Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols." Royal Society Open Science 5, no. 8 (2018): 180422. http://dx.doi.org/10.1098/rsos.180422.

Full text
Abstract:
We adjust the Proof of Work (PoW) consensus mechanism used in Bitcoin and Ethereum so that we can build on its strength while also addressing, in part, some of its perceived weaknesses. Notably, our work is motivated by the high energy consumption for mining PoW, and we want to restrict the use of PoW to a configurable, expected size of nodes, as a function of the local blockchain state. The approach we develop for this rests on three pillars: (i) Proof of Kernel Work (PoKW), a means of dynamically reducing the set of nodes that can participate in the solving of PoW puzzles such that an advers
APA, Harvard, Vancouver, ISO, and other styles
36

Sabri-Laghaie, Kamyar, Saeid Jafarzadeh Ghoushchi, Fatemeh Elhambakhsh, and Abbas Mardani. "Monitoring Blockchain Cryptocurrency Transactions to Improve the Trustworthiness of the Fourth Industrial Revolution (Industry 4.0)." Algorithms 13, no. 12 (2020): 312. http://dx.doi.org/10.3390/a13120312.

Full text
Abstract:
A completely new economic system is required for the era of Industry 4.0. Blockchain technology and blockchain cryptocurrencies are the best means to confront this new trustless economy. Millions of smart devices are able to complete transparent financial transactions via blockchain technology and its related cryptocurrencies. However, via blockchain technology, internet-connected devices may be hacked to mine cryptocurrencies. In this regard, monitoring the network of these blockchain-based transactions can be very useful to detect the abnormal behavior of users of these cryptocurrencies. The
APA, Harvard, Vancouver, ISO, and other styles
37

Tapas, Nachiket, Yechiav Yitzchak, Francesco Longo, Antonio Puliafito, and Asaf Shabtai. "P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release." Sensors 20, no. 7 (2020): 2156. http://dx.doi.org/10.3390/s20072156.

Full text
Abstract:
P 4 UIoT—pay-per-piece patch update delivery for IoT using gradual release—introduces a distributed framework for delivering patch updates to IoT devices. The framework facilitates distribution via peer-to-peer delivery networks and incentivizes the distribution operation. The peer-to-peer delivery network reduces load by delegating the patch distribution to the nodes of the network, thereby protecting against a single point of failure and reducing costs. Distributed file-sharing solutions currently available in the literature are limited to sharing popular files among peers. In contrast, the
APA, Harvard, Vancouver, ISO, and other styles
38

Zhou, Wei. "Fuzzy rules based efficient event-driven simulation of blockchain-based applications." Journal of Intelligent & Fuzzy Systems 40, no. 4 (2021): 8101–7. http://dx.doi.org/10.3233/jifs-189633.

Full text
Abstract:
Decentralized application (DAPP), replacing traditional business logic and data access layer with block chain, is a new form of Internet service. Testing DAPP requires large-scale distributed systems. Performing experiments in a real system is costly and difficult. This article carefully analyses the process of block generation and synchronization and explains the reasons for the low efficiency of block chain system simulation. We incorporate fuzzy rule based model for enhancing the logging system in blockchain. Rules based on fuzzy are utilized inside system of fuzzy logic to obtain outcome o
APA, Harvard, Vancouver, ISO, and other styles
39

Huntley, Dave. "Detecting a security breach and pinpointing its source." International Symposium on Microelectronics 2020, no. 1 (2020): 000067–72. http://dx.doi.org/10.4071/2380-4505-2020.1.000067.

Full text
Abstract:
Abstract There are many rapidly emerging technologies to embed a “Root of Trust” (RoT) in silicon or in assembled packages and PCBs further down the supply chain. These all aim to provide an un-hackable proof of device identity and uncompromised firmware. Despite these efforts we can, and should, assume that bad actors will succeed to counterfeit devices, install malware, etc. So how do we detect and respond to these attacks in time before they cause too much harm? This is, of course, of particular concern for defense and aerospace applications. We will discuss an initiative at SEMI to provide
APA, Harvard, Vancouver, ISO, and other styles
40

Baldominos, Alejandro, and Yago Saez. "Coin.AI: A Proof-of-Useful-Work Scheme for Blockchain-Based Distributed Deep Learning." Entropy 21, no. 8 (2019): 723. http://dx.doi.org/10.3390/e21080723.

Full text
Abstract:
One decade ago, Bitcoin was introduced, becoming the first cryptocurrency and establishing the concept of “blockchain” as a distributed ledger. As of today, there are many different implementations of cryptocurrencies working over a blockchain, with different approaches and philosophies. However, many of them share one common feature: they require proof-of-work to support the generation of blocks (mining) and, eventually, the generation of money. This proof-of-work scheme often consists in the resolution of a cryptography problem, most commonly breaking a hash value, which can only be achieved
APA, Harvard, Vancouver, ISO, and other styles
41

"An Effective Randomization Framework to POW Consensus Algorithm of Blockchain (RPoW)." International Journal of Engineering and Advanced Technology 8, no. 6 (2019): 1793–97. http://dx.doi.org/10.35940/ijeat.f8456.088619.

Full text
Abstract:
Blockchain technology has become a buzzword due to its intuitive applications and its decentralized network architecture. Blockchain is a decentralized system that uses peer -to - peer networking and appropriate consensus algorithm for secure and reliable transactions and records them all in an immutable ledger as chain of blocks. The world got introduced to the blockchain technology, when Satoshi Nakamoto released Bitcoin in 2009[2]. Though this technology is famous for being the backbone of cryptocurrencies, it has got into various industry domains and many applications have been developed u
APA, Harvard, Vancouver, ISO, and other styles
42

Mhana, Ammar, Ghassan N. Mohammed, and Fadhel K. Jabor. "Enhancing Privacy and Improving Security in Scalable Blockchain." Journal of Southwest Jiaotong University 54, no. 5 (2019). http://dx.doi.org/10.35741/issn.0258-2724.54.5.7.

Full text
Abstract:
Bitcoin is a decentralized blockchain-based cryptocurrency that has taken the world by storm. Since its introduction in 2009, it has grown tremendously in terms of popularity and market cap. The idea of having a decentralized public ledger while maintaining anonymity and security attracted the attention of developers and customers alike. Special nodes in the bitcoin network, called miners, are responsible for making the network secure by using a concept called proof-of-work. A certain degree of anonymity is also maintained as no personally identifiable information of a person, like name, addre
APA, Harvard, Vancouver, ISO, and other styles
43

"Preventing the Bitcoin Double Spend using Transaction Hash and Unspent Transaction Output." International Journal of Recent Technology and Engineering 8, no. 3 (2019): 3771–76. http://dx.doi.org/10.35940/ijrte.c5352.098319.

Full text
Abstract:
The red-hot crypto currency is a bitcoin which occupies first position in the capital investment of financial world which is assaulted by various factors like wallet attacks, network attacks, mining attacks and double spending attacks. Double spending is the major attack in which the attacker tries to cheat the network nodes and use the same coin for more than one set of transactions. Of this the original transaction identification from the set of transactions is a challenging one. In this paper we propose a solution for identifying the primary transaction from the set of double spended or mul
APA, Harvard, Vancouver, ISO, and other styles
44

Pathak, Prof Mrunal, Amol Suradkar, Ajinkya Kadam, Akansha Ghodeswar, and Prashant Parde. "Blockchain Based E-Voting System." International Journal of Scientific Research in Science and Technology, May 5, 2021, 134–40. http://dx.doi.org/10.32628/ijsrst2182120.

Full text
Abstract:
Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities
APA, Harvard, Vancouver, ISO, and other styles
45

Zhou, Lu, Chunpeng Ge, and Chunhua Su. "A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes." Science China Information Sciences 63, no. 3 (2020). http://dx.doi.org/10.1007/s11432-019-9922-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Motamed, Amir Pasha, and Behnam Bahrak. "Quantitative analysis of cryptocurrencies transaction graph." Applied Network Science 4, no. 1 (2019). http://dx.doi.org/10.1007/s41109-019-0249-6.

Full text
Abstract:
AbstractCryptocurrencies as a new way of transferring assets and securing financial transactions have gained popularity in recent years. Transactions in cryptocurrencies are publicly available, hence, statistical studies on different aspects of these currencies are possible. However, previous statistical analysis on cryptocurrencies transactions have been very limited and mostly devoted to Bitcoin, with no comprehensive comparison between these currencies. In this study, we intend to compare the transaction graph of Bitcoin, Ethereum, Litecoin, Dash, and Z-Cash, with respect to the dynamics of
APA, Harvard, Vancouver, ISO, and other styles
47

Fischer, Jan Alexander, Andres Palechor, Daniele Dell’Aglio, Abraham Bernstein, and Claudio J. Tessone. "The Complex Community Structure of the Bitcoin Address Correspondence Network." Frontiers in Physics 9 (June 30, 2021). http://dx.doi.org/10.3389/fphy.2021.681798.

Full text
Abstract:
Bitcoin is built on a blockchain, an immutable decentralized ledger that allows entities (users) to exchange Bitcoins in a pseudonymous manner. Bitcoins are associated with alpha-numeric addresses and are transferred via transactions. Each transaction is composed of a set of input addresses (associated with unspent outputs received from previous transactions) and a set of output addresses (to which Bitcoins are transferred). Despite Bitcoin was designed with anonymity in mind, different heuristic approaches exist to detect which addresses in a specific transaction belong to the same entity. By
APA, Harvard, Vancouver, ISO, and other styles
48

"Discovering the Bitcoin Double Spend using Lost Agreement Amount." International Journal of Recent Technology and Engineering 8, no. 3 (2019): 3764–70. http://dx.doi.org/10.35940/ijrte.c5351.098319.

Full text
Abstract:
In the modernized world like digital world, traditional way of payments through banks and other third parties are out of sphere. To meet the digital competency digital token like bitcoin based crypto currency payment is required. Lots of business persons are moving towards the digital way of secure payment. Intruders like hackers hamper the digital token and make immortality in the transaction which in turn create the double spend. Double spend is a serious threat in the Bitcoin network. Our research work focuses on double spend detection of transaction before it gets confirmed and added to th
APA, Harvard, Vancouver, ISO, and other styles
49

Shinde, Chetan, Atharav Upare, Vishal Pawar, and Ajay Raut. "Decentralized Stock and Cryptocurrency Exchange." International Journal of Advanced Research in Science, Communication and Technology, April 6, 2021, 63–68. http://dx.doi.org/10.48175/ijarsct-937.

Full text
Abstract:
We propose a new blockchain-based framework for a completely decentralized stock market and bitcoin exchange in this paper. By proposing a groundbreaking framework utilizing blockchain to build a decentralized bitcoin and stock exchange network, this paper discusses the shortcomings of conventional centralized stock exchange platforms, High transaction costs, vulnerable centralized governance, and a lack of clarity in consumer behavior and algorithms are just a few of the problems. Blockchain technology consists of a large number of computer nodes that share a shared ledger securely without th
APA, Harvard, Vancouver, ISO, and other styles
50

Polat, Onur, and Eylül Kabakçı Günay. "Cryptocurrency connectedness nexus the COVID-19 pandemic: evidence from time-frequency domains." Studies in Economics and Finance ahead-of-print, ahead-of-print (2021). http://dx.doi.org/10.1108/sef-01-2021-0011.

Full text
Abstract:
Purpose The purpose of this study is to investigate volatility connectedness between major cryptocurrencies by the virtue of market capitalization. In this context, this paper implements the frequency connectedness approach of Barunik and Krehlik (2018) and to measure short-, medium- and long-term connectedness between realized volatilities of cryptocurrencies. Additionally, this paper analyzes network graphs of directional TO/FROM spillovers before and after the announcement of the COVID-19 pandemic by the World Health Organization. Design/methodology/approach In this study, we examine the vo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!