A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
Blockchain technology is believed by many to be a game changer in many application
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …
A survey on security and privacy issues of bitcoin
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …
A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
Abstract The Internet of Things (IoT) is emerging as a new technology for the development of
various critical applications. However, these applications are still working on centralized …
various critical applications. However, these applications are still working on centralized …
Bitcoin and beyond: A technical survey on decentralized digital currencies
F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …
currencies and influenced many adjacent areas. This also induced significant scientific …
Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development
Blockchain technology has gained considerable attention for different types of stakeholders
due to its stable implementation in the field of digital currency like Bitcoin. Some users use …
due to its stable implementation in the field of digital currency like Bitcoin. Some users use …
Exploring the attack surface of blockchain: A systematic overview
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
The miner's dilemma
I Eyal - 2015 IEEE symposium on security and privacy, 2015 - ieeexplore.ieee.org
An open distributed system can be secured by requiring participants to present proof of work
and rewarding them for participation. The Bit coin digital currency introduced this …
and rewarding them for participation. The Bit coin digital currency introduced this …
Blockchain and smart contracts for higher education registry in Brazil
The validation of academic credits and issuance of academic degree certificates in the
Brazilian education system currently occurs in a semi or completely noncomputerized way …
Brazilian education system currently occurs in a semi or completely noncomputerized way …
Effective scheme against 51% attack on proof-of-work blockchain with history weighted information
X Yang, Y Chen, X Chen - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
Proof-of-Work (PoW) is a popular protocol used in Blockchain systems to resolve double-
spending problems. However, if an attacker has access to calculation hash power greater …
spending problems. However, if an attacker has access to calculation hash power greater …
Can we stabilize the price of a cryptocurrency? Understanding the design of Bitcoin and its potential to compete with Central Bank money
Y Kitamura - Quest for Good Money: Past, Present and Future, 2022 - Springer
Abstract Bitcoin (Nakamoto, 2008) is an electronic cash system designed to work without
central management. Despite recent enthusiasm, Bitcoin (BTC) and other so-called …
central management. Despite recent enthusiasm, Bitcoin (BTC) and other so-called …