BlockChain相关论文
In order to explore the influence of blockchain technology on supply chain financing,this article builds an evolutionary......
The metaverse concept empowers designers,bringing opportunities and challenges to the transformation of the digital econ......
Bitcoin is the most famous and the most used cryptocurrency in the world,such that it has received extreme popularity in......
Blockchain technology originated from virtual currency,which,since 2009,has sprung up all over the world and has gradual......
While blockchain technology is commonly considered potentially disruptive in various re-gards,there is a lack of underst......
As a future energy system,the smart grid is designed to improve the efficiency of traditional power sys-tems while provi......
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless net-works(6G).Due t......
The study evaluates five technologies or technological arrangements: internet, social networks,internet of things, block......
Internet of things (IoT) can provide the function of product traceability for industrial systems.Emerging blockchain tec......
The traditional ciphertext policy attribute-based encryption (CP-ABE) has two problems:one is that the access policy mus......
Double auction mechanisms have been designed to trade a variety of divisible resources (e.g.,electricity,mobile data,and......
Recently, sharded-blockchain has attracted more and more attention. Its inherited immutabili-ty, decentralization, and p......
The rationality and scientific nature of the emission trading mechanism is the key to the effective implementa-tion of e......
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings,such as smart offi......
Integer overflow is a common vulnerability in Ethereum Smart Contracts (ESCs) and often causes huge economic losses.Smar......
In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental prob......
Study on Decentralization of Spherical Amphibious Multi-robot Control System Based on Smart Contract
With the development of intelligent bionic robots and the improvement of military application,a single robot cannot meet......
Integration of Artificial Intelligence,Blockchain,and Wearable Technology for Chronic Disease Manage
Chronic diseases are a growing concern worldwide,with nearly 25%of adults suffering from one or more chronic health condi......
Telecom operators are deploying the fifth generation (5G) networks around the world which promises high information tran......
The concept of zero waste is an ideal situation that will require different solutions for different categories of waste.......
The new generation of cyber threat attacks has gradually shifted to APT attacks. The attack technology is complex and ch......
An Ethereum blockchain based on proof of stake (PoS) consensus mechanism is used to achieve the data sharing within the ......
Integration of Communication and Computing in Blockchain-Enabled Multi-Access Edge Computing Systems
Blockchain and multi-access edge com-puting (MEC) are two emerging promising tech-nologies that have received extensive ......
Many countries and governments consider smart cities a solution to global warming,population growth,and resource depleti......
Purchases of electric vehicles have been increasing in recent years.These vehicles differ from traditional fossil-fuel-b......
Blockchain technology is used in edge computing(EC)systems to solve the security problems caused by single point of fail......
Data island and information opacity are two major problems in collaborative administration.Blockchain has the potential ......
Delegated proof-of-stake(DPOS)consensus mechanism is widely adopted in blockchain platforms,but problems exist in its cu......
Threshold proxy re-encryption(PRE)authorizes the data access right of data subject to multiple proxies,who authorize the......
At present,there is an urgent need for blockchain interoperability technology to realize interconnection between various......
With the deployment of fifth-generation (5G) wireless networks worldwide,research on sixth-generation(6G) wireless commu......
Secure deduplication techniques have been wildly used in cloud storage to save both disk space and network bandwidth.How......
Block chain is widely used in the financial field for its characteristics of centralization,anonymity and trust.Electron......
Traditional voting schemes are used for the credit evaluation and authentication.During the voting process,the contents ......
随着区块链技术在数字货币领域的快速发展,区块链系统的经济价值不断攀升。巨大的经济利益诱使不法分子采用各种攻击手段对区块链......
In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing reso......
In this age when most organizations make use of cloud computing, it is important to not only protect cloud computing res......
The forking problem plays a key role in the security issue,which is a major concern in the blockchain system.Although ma......
A Large-Scale Heterogeneous Network(LS-HetNet)integrates different networks into one uniform network system to provide s......
Permissionless blockchain,as a kind of distributed ledger,has gained considerable attention because of its openness,tran......
Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit da......
In recent decades, intelligent transportation systems (ITS) have improved drivers\' safety and have shared information......
Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional vot......
The border gateway protocol (BGP) has become the indispensible infrastructure of the Internet as a typical inter-domain ......
In this paper, we deal with questions related to blockchains in complex Internet of Things (IoT)-based ecosystems. Such ......
Due to the transparency,simplicity,and blockchain system,cryptocurrencies gained popularity in the modern world.This led......
This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RL......
With advancements in technology,personal computing devices are better adapted for and further integrated into people\'......
With the advent of the digital age,new e-commerce formats emerge one after another.As a new mode of e-commerce,live e-co......
Fighting COVID-19 and Future Pandemics With the Internet of Things:Security and Privacy Perspectives
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-Co V-2; also referred to ......