Academic literature on the topic 'Privacy and transaction security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy and transaction security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy and transaction security"
Peng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai, and Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism." Mathematics 12, no. 10 (2024): 1481. http://dx.doi.org/10.3390/math12101481.
Full textChaubey, Suraj, Abhishek Ram, Deepak Gupta, Abdul Raheman, and Vivek Pandey. "Business Mapping in Context of Web 3.0 using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1189–96. http://dx.doi.org/10.22214/ijraset.2023.50277.
Full textWang, Guiyou, Chao Li, Bingrong Dai, and Shaohua Zhang. "Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption." Information 15, no. 8 (2024): 438. http://dx.doi.org/10.3390/info15080438.
Full textOgungbemi, Olumide Samuel. "The Role of Zero-Knowledge Proofs in Blockchain-Based Property Transactions to Ensure Data Privacy and Compliance with UK Regulations." Journal of Engineering Research and Reports 27, no. 3 (2025): 414–35. https://doi.org/10.9734/jerr/2025/v27i31443.
Full textWiranti, Ririn, Angraini Angraini, Mona Fronita, Siti Monalisa, and Medyantiwi Rahmawita Munzir. "THE INFLUENCE OF STUDENST PERCEPTION OF DATA SECURITY AND PRIVACY ON TRANSACTION TRUST IN THE TOKOPEDIA APPLICATION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 10, no. 3 (2024): 591–98. http://dx.doi.org/10.33330/jurteksi.v10i3.3179.
Full textWei, Zeming, Jiawen Fang, Zhicheng Hong, et al. "Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism." Applied Sciences 14, no. 4 (2024): 1642. http://dx.doi.org/10.3390/app14041642.
Full textSamay Deepak Ashar. "Next-generation AI solutions for transaction security in digital finance." International Journal of Science and Research Archive 14, no. 1 (2025): 930–38. https://doi.org/10.30574/ijsra.2025.14.1.0105.
Full textJulian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.
Full textChen, Jing, Tao Li, and Min Huang. "The privacy protection of the internet of vehicles resource transaction details based on blockchain." PLOS ONE 20, no. 1 (2025): e0312854. https://doi.org/10.1371/journal.pone.0312854.
Full textJiang, Wenbao, Jin Ding, and Haibao Zhang. "Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption." Applied Sciences 15, no. 7 (2025): 3723. https://doi.org/10.3390/app15073723.
Full textDissertations / Theses on the topic "Privacy and transaction security"
Ongkasuwan, Patarawan. "Transaction synchronization and privacy aspect in blockchain decentralized applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272134.
Full textAngulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.
Full textFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Full textЛитвиненко, Галина Іванівна, Галина Ивановна Литвиненко, Halyna Ivanivna Lytvynenko, and R. Pelepei. "Internet security and privacy." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16048.
Full textCatania, Emanuele Gaetano. "Security and privacy in 5G." Doctoral thesis, Università di Catania, 2019. http://hdl.handle.net/10761/4188.
Full textHaver, Torstein. "Security and Privacy in RFID Applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9325.
Full textDeYoung, Mark E. "Privacy Preserving Network Security Data Analytics." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82909.
Full textGroat, Stephen Lawrence. "Privacy and Security in IPv6 Addressing." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76978.
Full textTaylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.
Full textGangwal, Ankit. "Security and Privacy Implications of Cryptocurrencies." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425437.
Full textBooks on the topic "Privacy and transaction security"
Institute, Pennsylvania Bar, ed. Privacy & security. Pennsylvania Bar Institute, 2007.
Find full textStănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.
Full textStănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.
Full textNandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.
Full textStalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.
Full textInstitute, Pennsylvania Bar. Privacy and security. Pennsylvania Bar Institute, 2006.
Find full textBaek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.
Full textLi, Yingjiu, Robert H. Deng, and Elisa Bertino. RFID Security and Privacy. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02340-8.
Full textBoyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.
Full textVaradharajan, Vijay, and Yi Mu, eds. Information Security and Privacy. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5.
Full textBook chapters on the topic "Privacy and transaction security"
Shen, Meng, Xiangyun Tang, Wei Wang, and Liehuang Zhu. "Malicious Transaction Deanonymity in Web 3.0." In Digital Privacy and Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5752-7_8.
Full textShen, Meng, Xiangyun Tang, Wei Wang, and Liehuang Zhu. "Malicious Transaction Detection in Web 3.0." In Digital Privacy and Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5752-7_7.
Full textHanaoka, Goichiro, Yuliang Zheng, and Hideki Imai. "LITESET: A light-weight secure electronic transaction protocol." In Information Security and Privacy. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053735.
Full textRuffing, Tim, and Pedro Moreno-Sanchez. "ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_8.
Full textGervais, Arthur, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, and Srdjan Capkun. "Quantifying Location Privacy Leakage from Transaction Prices." In Computer Security – ESORICS 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_20.
Full textMessias, Johnnatan, Vabuk Pahari, Balakrishnan Chandrasekaran, Krishna P. Gummadi, and Patrick Loiseau. "Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains." In Financial Cryptography and Data Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47751-5_13.
Full textKlinec, Dusan, and Vashek Matyas. "Privacy-Friendly Monero Transaction Signing on a Hardware Wallet." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_23.
Full textMemon, Neelam, and Jianhua Shao. "MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce." In Data and Applications Security and Privacy XXIX. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_1.
Full textXia, Ying, Yu Huang, Xu Zhang, and HaeYoung Bae. "Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_38.
Full textEsgin, Muhammed F., Joseph K. Liu, Shi-Feng Sun, and Dimaz Ankaa Wijaya. "The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain." In Advances in Information Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32146-7_5.
Full textConference papers on the topic "Privacy and transaction security"
Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.
Full textLiu, Jianan, Siqi Lu, Yongjuan Wang, Peixuan Feng, and Wenrui Cao. "Privacy Protection Scheme for Storage and Transaction of Non-Fungible Tokens." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00009.
Full textWang, Yusen, Jiong Lou, Zihan Wang, and Jie Li. "Front-running Attacks in Hash-Based Transaction Sharding Blockchains." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00053.
Full textZang, Ruijia, Zhengyuan Deng, Shaofen Fan, et al. "Research on Bitcoin-Compatible Off-Chain Multi-Channel Crowdfunding Method with Transaction Amount Privacy." In 2025 2nd International Conference on Algorithms, Software Engineering and Network Security (ASENS). IEEE, 2025. https://doi.org/10.1109/asens64990.2025.11011172.
Full textProtsenko, Mykolai, Albert Stark, Andreas Papon, and Sandra Kostic. "VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00044.
Full textHuijuan Wang, Lei Guan. "An Automated Bitcoin Address Labeling Method Based on Transaction Behavior Analysis." In 2024 IEEE International Conference on Security, Privacy, Anonymity in Computation and Communication and Storage (SpaCCS). IEEE, 2024. https://doi.org/10.1109/spaccs63173.2024.00015.
Full textZou, Huiying, Jia Duan, Xi Liu, et al. "Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00170.
Full textZhang, Mengya, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. "Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00047.
Full textXia, Qi, Badjie Ansu, Jianbin Gao, Mupoyi Ntuala Grace, Hu Xia, and Obiri Isaac Amankona. "A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00106.
Full textLv, Yaru, Lijun Sun, and Xiao Chen. "FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00334.
Full textReports on the topic "Privacy and transaction security"
Serzo, Aiken Larisa. Cross-border Data Regulation for Digital Platforms: Data Privacy and Security. Philippine Institute for Development Studies, 2020. https://doi.org/10.62986/dp2020.47.
Full textPasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.
Full textPasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.
Full textPerdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Full textBossert, G., S. Cooper, and W. Drummond. Considerations for Web Transaction Security. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2084.
Full textWeinberger, P., C. Callan, W. Dally, A. Peterson, and W. Press. Security and Privacy in the NII,. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada293475.
Full textElkins, M. MIME Security with Pretty Good Privacy (PGP). RFC Editor, 1996. http://dx.doi.org/10.17487/rfc2015.
Full textSmith, S. W., and J. D. Tygar. Security and Privacy for Partial Order Time. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada278953.
Full textCooper, A., F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7721.
Full textGilbert, Dennis M. 1989 Computer Security and Privacy Plans (CSSP) review project:. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4409.
Full text