Academic literature on the topic 'Privacy and transaction security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy and transaction security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy and transaction security"

1

Peng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai, and Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism." Mathematics 12, no. 10 (2024): 1481. http://dx.doi.org/10.3390/math12101481.

Full text
Abstract:
Blockchain technology, initially developed as a decentralized and transparent mechanism for recording transactions, faces significant privacy challenges due to its inherent transparency, exposing sensitive transaction data to all network participants. This study proposes a blockchain privacy protection algorithm that employs a digital mutual trust mechanism integrated with advanced cryptographic techniques to enhance privacy and security in blockchain transactions. The contribution includes the development of a new dynamic Byzantine consensus algorithm within the Practical Byzantine Fault Tole
APA, Harvard, Vancouver, ISO, and other styles
2

Chaubey, Suraj, Abhishek Ram, Deepak Gupta, Abdul Raheman, and Vivek Pandey. "Business Mapping in Context of Web 3.0 using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1189–96. http://dx.doi.org/10.22214/ijraset.2023.50277.

Full text
Abstract:
Abstract: The foundation of e-commerce is based on conducting transactions and transferring goods online without the need for physical travel. However, cyber threats can pose a risk when it comes to transferring transactional data. Our primary goal is to develop a system that can protect against such mishaps during the process of transmitting transactional data. Additionally, we aim to implement an automated system that ensures error-free transactions. To achieve these objectives, we will leverage the latest technologies such as blockchain and smart contracts. Blockchain technology provides a
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Guiyou, Chao Li, Bingrong Dai, and Shaohua Zhang. "Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption." Information 15, no. 8 (2024): 438. http://dx.doi.org/10.3390/info15080438.

Full text
Abstract:
This study proposes an privacy-protection method for blockchain transactions based on lightweight homomorphic encryption, aiming to ensure the security of transaction data and user privacy, and improve transaction efficiency. We have built a blockchain infrastructure and, based on its structural characteristics, adopted zero-knowledge proof technology to verify the legitimacy of data, ensuring the authenticity and accuracy of transactions from the application end to the smart-contract end. On this basis, the Paillier algorithm is used for key generation, encryption, and decryption, and intelli
APA, Harvard, Vancouver, ISO, and other styles
4

Ogungbemi, Olumide Samuel. "The Role of Zero-Knowledge Proofs in Blockchain-Based Property Transactions to Ensure Data Privacy and Compliance with UK Regulations." Journal of Engineering Research and Reports 27, no. 3 (2025): 414–35. https://doi.org/10.9734/jerr/2025/v27i31443.

Full text
Abstract:
Property transactions in the UK are increasingly adopting blockchain technology to enhance efficiency, transparency, and security. However, the inherent transparency of blockchain raises significant data privacy risks and regulatory compliance challenges, particularly under the UK General Data Protection Regulation (UK GDPR). This study examines the role of Zero-Knowledge Proofs (ZKPs) in addressing these concerns by enabling transaction validation while preserving confidentiality. Using entropy measures, k-anonymity analysis, and logistic regression, this research quantitatively assesses the
APA, Harvard, Vancouver, ISO, and other styles
5

Wiranti, Ririn, Angraini Angraini, Mona Fronita, Siti Monalisa, and Medyantiwi Rahmawita Munzir. "THE INFLUENCE OF STUDENST PERCEPTION OF DATA SECURITY AND PRIVACY ON TRANSACTION TRUST IN THE TOKOPEDIA APPLICATION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 10, no. 3 (2024): 591–98. http://dx.doi.org/10.33330/jurteksi.v10i3.3179.

Full text
Abstract:
Abstract: The current development of technology has successfully met various societal needs, one of which is the buying and selling activities. This development has led people to engage in online transactions, where buyers do not necessarily have to meet sellers in person. Tokopedia is one of the most popular e-commerce platforms used in Indonesia. Security issues arose when in 2020 Tokopedia experienced a breach, with data from around 91 million accounts being compromised by hackers. Consequently, Tokopedia needed to establish a Data Protection and Privacy Office (DPPO) to protect and safegua
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Zeming, Jiawen Fang, Zhicheng Hong, et al. "Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism." Applied Sciences 14, no. 4 (2024): 1642. http://dx.doi.org/10.3390/app14041642.

Full text
Abstract:
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of being exposed. Therefore, this paper proposes the blockchain transaction privacy protection method based on the stealth address and the note mechanism to address the privacy leakage risk in blockchain public environments. Firstly, the proposed method generates a random seed known only to the parties involved based on the Diffie–Hellman key exc
APA, Harvard, Vancouver, ISO, and other styles
7

Samay Deepak Ashar. "Next-generation AI solutions for transaction security in digital finance." International Journal of Science and Research Archive 14, no. 1 (2025): 930–38. https://doi.org/10.30574/ijsra.2025.14.1.0105.

Full text
Abstract:
Cybersecurity threats in financial transactions have intensified with the growing adoption of digital financial platforms, necessitating advanced, scalable solutions. This study evaluates the effectiveness of LightGBM, Attention-Based Neural Networks, and CatBoost models in enhancing the security of financial systems. LightGBM was employed to detect fraud by uncovering complex patterns in transactional data, utilizing both numerical and categorical features. Attention mechanisms were incorporated to improve model accuracy by prioritizing relevant features for fraud detection. Sequential transa
APA, Harvard, Vancouver, ISO, and other styles
8

Julian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.

Full text
Abstract:
Securing sensitive user information and maintaining privacy during authentication and authorization processes is crucial in today’s interconnected digital world. This study investigates new approaches to tackle these obstacles by combining blockchain technology with Trusted Execution Environment (TEE). The proposed system introduces a new method that combines the advantages of both technologies to create a strong and privacy-focused framework for network security. The study assesses the effectiveness of the suggested system based on key parameters, focusing specifically on Transaction Throughp
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Jing, Tao Li, and Min Huang. "The privacy protection of the internet of vehicles resource transaction details based on blockchain." PLOS ONE 20, no. 1 (2025): e0312854. https://doi.org/10.1371/journal.pone.0312854.

Full text
Abstract:
The rapid development of Internet of Things technology has promoted the popularization of Internet of Vehicles, and its safety and reliability have become the focus of intelligent transportation system research. Vehicle-road collaboration relies on the collaborative computing and storage resources of the vehicle on-board unit (OBU), which are usually limited. When the vehicle in the edge area needs to do computing tasks such as intelligent driving, but its own computing resources are insufficient. Therefore, it needs other computing resources from idle vehicles and road side unit (RSU). This r
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Wenbao, Jin Ding, and Haibao Zhang. "Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption." Applied Sciences 15, no. 7 (2025): 3723. https://doi.org/10.3390/app15073723.

Full text
Abstract:
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ensuring secure blockchain transactions while minimizing both computational and communication overhead. During the transaction process, this approach utilizes certificateless public key signcryption without bilinear pairs to generate anonymous user identities, achieving strong anonymity of user identities and confidentiality of transaction amounts. I
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy and transaction security"

1

Ongkasuwan, Patarawan. "Transaction synchronization and privacy aspect in blockchain decentralized applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272134.

Full text
Abstract:
The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. Generally, Blockchain has been used for digital currency or cryptocurrency since its inception. One of the best-known Blockchain protocols is Ethereum, which has invented the smart contract to enable Blockchain’s ability to execute a condition, rather than simply acting as storage. Applications that adopt this technology are called
APA, Harvard, Vancouver, ISO, and other styles
2

Angulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.

Full text
Abstract:
The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Fischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Литвиненко, Галина Іванівна, Галина Ивановна Литвиненко, Halyna Ivanivna Lytvynenko, and R. Pelepei. "Internet security and privacy." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Catania, Emanuele Gaetano. "Security and privacy in 5G." Doctoral thesis, Università di Catania, 2019. http://hdl.handle.net/10761/4188.

Full text
Abstract:
The current advancements of communication systems and their applications have changed our lives and will influence them further in the future. Next generation 5G networks will represent a salient technological breakthrough that combines old and new technologies and involves, among all, new models of service provisioning and resource sharing. In particular, they will lead to the emergence of mechanisms and architectures towards the on-demand multi-tenant philosophy. In this new eco- system, it will be necessary to address the trust question among stakeholders as well as their security. The 5G r
APA, Harvard, Vancouver, ISO, and other styles
6

Haver, Torstein. "Security and Privacy in RFID Applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9325.

Full text
Abstract:
<p>Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increase the efficiency of many common applications and is thus becoming increasingly popular. The main drawback is that the general principles the technology is built on are very vulnerable to attack. The ID imbedded in every chip combined with the openness of the radio interface exposes the users to tracking. As additional sensitive information may be stored on the tags, the user may also be exposed to other security and privacy threats. This thesis investigates how easily the reading distance o
APA, Harvard, Vancouver, ISO, and other styles
7

DeYoung, Mark E. "Privacy Preserving Network Security Data Analytics." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82909.

Full text
Abstract:
The problem of revealing accurate statistics about a population while maintaining privacy of individuals is extensively studied in several related disciplines. Statisticians, information security experts, and computational theory researchers, to name a few, have produced extensive bodies of work regarding privacy preservation. Still the need to improve our ability to control the dissemination of potentially private information is driven home by an incessant rhythm of data breaches, data leaks, and privacy exposure. History has shown that both public and private sector organizations are no
APA, Harvard, Vancouver, ISO, and other styles
8

Groat, Stephen Lawrence. "Privacy and Security in IPv6 Addressing." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76978.

Full text
Abstract:
Due to an exponentially larger address space than Internet Protocol version 4 (IPv4), the Internet Protocol version 6 (IPv6) uses new methods to assign network addresses to Internet nodes. StateLess Address Auto Configuration (SLAAC) creates an address using a static value derived from the Media Access Control (MAC) address of a network interface as host portion, or interface identifier (IID). The Dynamic Host Configuration Protocol version 6 (DHCPv6) uses a client-server model to manage network addresses, providing stateful address configuration. While DHCPv6 can be configured to assign rando
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.

Full text
Abstract:
Smartphones are highly-capable mobile computing devices that have dramatically changed how people do business, interact with online services, and receive entertainment. Smartphone functionality is enhanced by an ecosystem of apps seemingly covering the entire gamut of functionality. While smartphone apps have undoubtedly provided immeasurable benefit to users, they also contribute their fair share of drawbacks, such as increases in security risks and the erosion of user privacy. In this thesis, I focus on the Android smartphone operating system, and pave the way for improving the security and
APA, Harvard, Vancouver, ISO, and other styles
10

Gangwal, Ankit. "Security and Privacy Implications of Cryptocurrencies." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425437.

Full text
Abstract:
Le criptovalute sono valute digitali basate sulla crittografia. A differenza delle tradizionali valute legali emesse da sistemi bancari centralizzati, le criptovalute sono decentralizzate e mantenute attraverso meccanismi di consenso distribuito. Nel novembre 2008 Satoshi Nakamoto ha introdotto la prima criptovaluta veramente funzionale: il Bitcoin. Dopo alcuni anni passati nell’ombra, Bitcoin guadagnò rapidamente notorietà, creando un'economia da miliardi di dollari. Sull’onda del successo di Bitcoin il mercato ha visto nascere diverse altre criptovalute. A settembre 2019 si sono registrate p
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Privacy and transaction security"

1

Institute, Pennsylvania Bar, ed. Privacy & security. Pennsylvania Bar Institute, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institute, Pennsylvania Bar. Privacy and security. Pennsylvania Bar Institute, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Yingjiu, Robert H. Deng, and Elisa Bertino. RFID Security and Privacy. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02340-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Varadharajan, Vijay, and Yi Mu, eds. Information Security and Privacy. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Privacy and transaction security"

1

Shen, Meng, Xiangyun Tang, Wei Wang, and Liehuang Zhu. "Malicious Transaction Deanonymity in Web 3.0." In Digital Privacy and Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5752-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Meng, Xiangyun Tang, Wei Wang, and Liehuang Zhu. "Malicious Transaction Detection in Web 3.0." In Digital Privacy and Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5752-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hanaoka, Goichiro, Yuliang Zheng, and Hideki Imai. "LITESET: A light-weight secure electronic transaction protocol." In Information Security and Privacy. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ruffing, Tim, and Pedro Moreno-Sanchez. "ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gervais, Arthur, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, and Srdjan Capkun. "Quantifying Location Privacy Leakage from Transaction Prices." In Computer Security – ESORICS 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Messias, Johnnatan, Vabuk Pahari, Balakrishnan Chandrasekaran, Krishna P. Gummadi, and Patrick Loiseau. "Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains." In Financial Cryptography and Data Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47751-5_13.

Full text
Abstract:
AbstractIn permissionless blockchains, transaction issuers include a fee to incentivize miners to include their transactions. To accurately estimate this prioritization fee for a transaction, transaction issuers (or blockchain participants, mjohnme@mpi-sws.orgore generally) rely on two fundamental notions of transparency, namely contention and prioritization transparency. Contention transparency implies that participants are aware of every pending transaction that will contend with a given transaction for inclusion. Prioritization transparency states that the participants are aware of the tran
APA, Harvard, Vancouver, ISO, and other styles
7

Klinec, Dusan, and Vashek Matyas. "Privacy-Friendly Monero Transaction Signing on a Hardware Wallet." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Memon, Neelam, and Jianhua Shao. "MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce." In Data and Applications Security and Privacy XXIX. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xia, Ying, Yu Huang, Xu Zhang, and HaeYoung Bae. "Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Esgin, Muhammed F., Joseph K. Liu, Shi-Feng Sun, and Dimaz Ankaa Wijaya. "The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain." In Advances in Information Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32146-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy and transaction security"

1

Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Jianan, Siqi Lu, Yongjuan Wang, Peixuan Feng, and Wenrui Cao. "Privacy Protection Scheme for Storage and Transaction of Non-Fungible Tokens." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yusen, Jiong Lou, Zihan Wang, and Jie Li. "Front-running Attacks in Hash-Based Transaction Sharding Blockchains." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zang, Ruijia, Zhengyuan Deng, Shaofen Fan, et al. "Research on Bitcoin-Compatible Off-Chain Multi-Channel Crowdfunding Method with Transaction Amount Privacy." In 2025 2nd International Conference on Algorithms, Software Engineering and Network Security (ASENS). IEEE, 2025. https://doi.org/10.1109/asens64990.2025.11011172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Protsenko, Mykolai, Albert Stark, Andreas Papon, and Sandra Kostic. "VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huijuan Wang, Lei Guan. "An Automated Bitcoin Address Labeling Method Based on Transaction Behavior Analysis." In 2024 IEEE International Conference on Security, Privacy, Anonymity in Computation and Communication and Storage (SpaCCS). IEEE, 2024. https://doi.org/10.1109/spaccs63173.2024.00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zou, Huiying, Jia Duan, Xi Liu, et al. "Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Mengya, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. "Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xia, Qi, Badjie Ansu, Jianbin Gao, Mupoyi Ntuala Grace, Hu Xia, and Obiri Isaac Amankona. "A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lv, Yaru, Lijun Sun, and Xiao Chen. "FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00334.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy and transaction security"

1

Serzo, Aiken Larisa. Cross-border Data Regulation for Digital Platforms: Data Privacy and Security. Philippine Institute for Development Studies, 2020. https://doi.org/10.62986/dp2020.47.

Full text
Abstract:
The rise of digital platforms necessarily entails the processing of personal data between platforms and their users. More than enabling the delivery of services by the platforms, data shared by users has increasingly become valuable as various businesses are able to leverage their access to data in order to create and upsell other services. However, the ability of platforms to engage in cross-border transactions or operations are affected by the stringent requirements of data protection laws, coupled with the divergent regulations among jurisdictions. With the Philippines as an example, this p
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.

Full text
Abstract:
Abstract: Automated smart contracts represent a paradigm shift in decentralized governance by integrating artificial intelligence (AI) with blockchain technologies to enhance security, scalability, and adaptability. Traditional smart contracts, while enabling trustless and automated transactions, often lack the flexibility to adapt to dynamic regulatory frameworks, evolving economic conditions, and real-time security threats. AI-powered smart contracts leverage machine learning, reinforcement learning, and predictive analytics to optimize contract execution, detect fraudulent transactions, and
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
4

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
5

Bossert, G., S. Cooper, and W. Drummond. Considerations for Web Transaction Security. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weinberger, P., C. Callan, W. Dally, A. Peterson, and W. Press. Security and Privacy in the NII,. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada293475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elkins, M. MIME Security with Pretty Good Privacy (PGP). RFC Editor, 1996. http://dx.doi.org/10.17487/rfc2015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, S. W., and J. D. Tygar. Security and Privacy for Partial Order Time. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada278953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cooper, A., F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gilbert, Dennis M. 1989 Computer Security and Privacy Plans (CSSP) review project:. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!