Journal articles on the topic 'Privacy and transaction security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy and transaction security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Peng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai, and Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism." Mathematics 12, no. 10 (2024): 1481. http://dx.doi.org/10.3390/math12101481.
Full textWang, Guiyou, Chao Li, Bingrong Dai, and Shaohua Zhang. "Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption." Information 15, no. 8 (2024): 438. http://dx.doi.org/10.3390/info15080438.
Full textChaubey, Suraj, Abhishek Ram, Deepak Gupta, Abdul Raheman, and Vivek Pandey. "Business Mapping in Context of Web 3.0 using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1189–96. http://dx.doi.org/10.22214/ijraset.2023.50277.
Full textOgungbemi, Olumide Samuel. "The Role of Zero-Knowledge Proofs in Blockchain-Based Property Transactions to Ensure Data Privacy and Compliance with UK Regulations." Journal of Engineering Research and Reports 27, no. 3 (2025): 414–35. https://doi.org/10.9734/jerr/2025/v27i31443.
Full textWiranti, Ririn, Angraini Angraini, Mona Fronita, Siti Monalisa, and Medyantiwi Rahmawita Munzir. "THE INFLUENCE OF STUDENST PERCEPTION OF DATA SECURITY AND PRIVACY ON TRANSACTION TRUST IN THE TOKOPEDIA APPLICATION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 10, no. 3 (2024): 591–98. http://dx.doi.org/10.33330/jurteksi.v10i3.3179.
Full textWei, Zeming, Jiawen Fang, Zhicheng Hong, et al. "Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism." Applied Sciences 14, no. 4 (2024): 1642. http://dx.doi.org/10.3390/app14041642.
Full textSamay Deepak Ashar. "Next-generation AI solutions for transaction security in digital finance." International Journal of Science and Research Archive 14, no. 1 (2025): 930–38. https://doi.org/10.30574/ijsra.2025.14.1.0105.
Full textJulian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.
Full textChen, Jing, Tao Li, and Min Huang. "The privacy protection of the internet of vehicles resource transaction details based on blockchain." PLOS ONE 20, no. 1 (2025): e0312854. https://doi.org/10.1371/journal.pone.0312854.
Full textJiang, Wenbao, Jin Ding, and Haibao Zhang. "Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption." Applied Sciences 15, no. 7 (2025): 3723. https://doi.org/10.3390/app15073723.
Full textRonith, Pingili, Erukulla Naresh, and Nagraj Rahul. "Zero-Knowledge Proofs and Privacy-Preserving Blockchain Protocols: Enhancing Security in Digital Financial Transactions." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 22–24. https://doi.org/10.5281/zenodo.14964668.
Full textZhu, Jialin, Wenlong Feng, Wang Zhong, Mengxing Huang, and Siling Feng. "Research on Privacy Protection of Technology Service Transactions Based on Blockchain and Zero-Knowledge Proof." Wireless Communications and Mobile Computing 2023 (February 16, 2023): 1–7. http://dx.doi.org/10.1155/2023/6196872.
Full textZhou, Wei, De Zhang, Guangjie Han, Wenyin Zhu, and Xupeng Wang. "A Blockchain-Based Privacy-Preserving and Fair Data Transaction Model in IoT." Applied Sciences 13, no. 22 (2023): 12389. http://dx.doi.org/10.3390/app132212389.
Full textMi, Bo, Bingqing Wu, Darong Huang, Yang Liu, Lu Chen, and Shaohua Wan. "Privacy-Oriented Transaction for Public Blockchain via Secret Sharing." Security and Communication Networks 2022 (November 19, 2022): 1–19. http://dx.doi.org/10.1155/2022/9946088.
Full textSong, Yu, Ao Xiong, Xuesong Qiu, et al. "A Blockchain-Based Method for Optimizing the Routing of High-Frequency Carbon-Trading Payment Channels." Electronics 12, no. 12 (2023): 2586. http://dx.doi.org/10.3390/electronics12122586.
Full textXie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.
Full textYao, Shuang, and Dawei Zhang. "A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit." Electronic Research Archive 31, no. 2 (2022): 729–53. http://dx.doi.org/10.3934/era.2023036.
Full textLi, Yufeng, Yuling Chen, Tao Li, and Xiaojun Ren. "A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain." Security and Communication Networks 2021 (December 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/4840253.
Full textSanjaya, Bora, and Sri Ekowati. "PENGARUH PRIVASI, KEAMANAN DAN KEPERCAYAAN TERHADAP NIAT BERTRANSAKSI ONLINE DI SITUS SHOPEE (Studi Kasus Pada Masyarakat Jl. Hibrida RT. 07 Kota Bengkulu)." (JEMS) Jurnal Entrepreneur dan Manajemen Sains 3, no. 2 (2022): 155–66. http://dx.doi.org/10.36085/jems.v3i2.2847.
Full textAnikievich, Aleksandr. "Proposals for the implementation of a platform for conducting international settlements in digital currencies of central banks." Scientific Research and Development. Economics of the Firm 13, no. 3 (2024): 40–45. http://dx.doi.org/10.12737/2306-627x-2024-13-3-40-45.
Full textSong, Zilong, Xiaohong Zhang, and Miaomiao Liang. "Reliable Reputation Review and Secure Energy Transaction of Microgrid Community Based on Hybrid Blockchain." Wireless Communications and Mobile Computing 2021 (June 21, 2021): 1–17. http://dx.doi.org/10.1155/2021/9916735.
Full textSetiawan, Hendra, and Neza Novitasari. "EASE TRANSACTIONS AND PRIVACY SECURITY ON THE DECISION TO REUSE QRIS AS A TOOL OF PAYMENT THROUGH USER EXPERIENCE IN MADIUN CITY." Jurnal Ilmiah Bisnis dan Ekonomi Asia 18, no. 2 (2024): 204–12. http://dx.doi.org/10.32815/jibeka.v18i2.2081.
Full textK, MR VIJAY. "CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN TECHNOLOGICAL AGE." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34634.
Full textKhan, Mohammad Monirujjaman, Nesat Tasneem RoJa, Faris A. Almalki, and Maha Aljohani. "Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract." Security and Communication Networks 2022 (May 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/2213336.
Full textAl-Sarayrah, Najah, Nidal Turab, and Abdelrahman Hussien. "A randomized blockchain consensus algorithm for enhancing security in health insurance." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1304. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1304-1314.
Full textAl-Sarayrah, Najah, Nidal Turab, and Abdelrahman Hussien. "A randomized blockchain consensus algorithm for enhancing security in health insurance." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1304–14. https://doi.org/10.11591/ijeecs.v34.i2.pp1304-1314.
Full textXia, Xiufeng, Tingting Hou, Xiangyu Liu, Chuanyu Zong, and Shengsheng Mu. "Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility." Wireless Communications and Mobile Computing 2022 (March 15, 2022): 1–13. http://dx.doi.org/10.1155/2022/9358531.
Full textLan, Fei, Junjia Yang, Hao Feng, et al. "Research on ZKP Algorithm of Data Asset Security and Privacy Protection Based on Blockchain Technology." International Journal of e-Collaboration 20, no. 1 (2024): 1–20. http://dx.doi.org/10.4018/ijec.349211.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Full textHu, Jianwen, Yuling Chen, Xiaojun Ren, Yixian Yang, Xiaobin Qian, and Xiaomei Yu. "Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things." Mobile Information Systems 2021 (November 17, 2021): 1–13. http://dx.doi.org/10.1155/2021/7397926.
Full textEt. al., Santosh Kumar Sharma,. "A Framework Of Big Data As Service Platform For Access Control & Privacy Protection Using Blockchain Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 476–85. http://dx.doi.org/10.17762/turcomat.v12i11.5910.
Full textZhang, Shuhui, Ruiyao Zhou, Lianhai Wang, Shujiang Xu, and Wei Shao. "Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection." Electronics 12, no. 24 (2023): 5010. http://dx.doi.org/10.3390/electronics12245010.
Full textLambongang, James Mado. "Investigating Challenges of Mobile Money usage in the Central Business District of the Kumasi Metropolitan Assembly, Adum- Ghana." TEXILA INTERNATIONAL JOURNAL OF MANAGEMENT 9, no. 1 (2023): 42–57. http://dx.doi.org/10.21522/tijmg.2015.09.01.art004.
Full textEkaningsih, Lailasari, and Irfan Rizky Hutomo. "The Role of Notaries in Consumer Protection in E-Commerce in the Era of Digitalization." Sultan Agung Notary Law Review 6, no. 1 (2024): 1. https://doi.org/10.30659/sanlar.v6i1.36598.
Full textSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Full textYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Full textThakkar, Vidhi, and Vrushank Shah. "A Privacy-Preserving Framework Using Hyperledger Fabric for EHR Sharing Applications." International journal of electrical and computer engineering systems 14, no. 6 (2023): 667–76. http://dx.doi.org/10.32985/ijeces.14.6.6.
Full textLi, Yang, Mengying Jiang, Mei Yu, et al. "A Non-Transferable Trade Scheme of Green Power Based on Blockchain." Energies 17, no. 16 (2024): 4002. http://dx.doi.org/10.3390/en17164002.
Full textN, Dhiwakar, Boopathy E, Indrajeeth Y, and Rahul V. "Secured and Privacy in Exam Cell Management System Using Blockchain Mechanism with Advanced Encryption Standard (AES) Algorithm." International Research Journal of Computer Science 11, no. 04 (2024): 314–19. http://dx.doi.org/10.26562/irjcs.2024.v1104.30.
Full textCheng, Qishuo, Yulu Gong, Yang Qin, Xiang Ao, and Zhenglin Li. "Secure Digital Asset Transactions: Integrating Distributed Ledger Technology with Safe AI Mechanisms." Academic Journal of Science and Technology 9, no. 3 (2024): 156–61. http://dx.doi.org/10.54097/2qhab557.
Full textDr. S. Gandhimathi and Ms. J. Soundarya. "Credit Card Transaction Security Using Facial Recognition Technology." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2358–65. https://doi.org/10.32628/cseit23112573.
Full textZhang, Ruochi, Yi Li, and Li Fang. "PBTMS: A Blockchain-Based Privacy-Preserving System for Reliable and Efficient E-Commerce." Electronics 14, no. 6 (2025): 1177. https://doi.org/10.3390/electronics14061177.
Full textEngelmann, Felix, Thomas Kerber, Markulf Kohlweiss, and Mikhail Volkhov. "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 507–27. http://dx.doi.org/10.56553/popets-2022-0120.
Full textMarak, Trealindora, Labianglang Sohkhlet, and Upasana Das. "BLOCKCHAIN-BASED HEALTHCARE RECORD MANAGEMENT SYSTEM." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (2022): 288–95. http://dx.doi.org/10.33564/ijeast.2022.v06i09.042.
Full textFarah, Maath Jasem, Makki Sagheer Ali, and M. Awad Abdullah. "Enhancement of digital signature algorithm in bitcoin wallet." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 449–57. https://doi.org/10.11591/eei.v10i1.2339.
Full textUtama, Iston Dwija, Ivan Diryana Sudirman, and Dian Kurnianingrum. "Beyond transactions: Understanding the determinants of e-satisfaction in online shopping." Journal of Asian Scientific Research 14, no. 2 (2024): 251–65. http://dx.doi.org/10.55493/5003.v14i2.5063.
Full textCachin, Christian, and François-Xavier Wicht. "Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 926–43. https://doi.org/10.56553/popets-2025-0165.
Full textNi, Xue. "Research on the Legal Protection of Consumer Rights on Mobile Internet." Advanced Materials Research 926-930 (May 2014): 2622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2622.
Full text