Security aspects of cryptocurrency wallets—a systematic literature review

S Houy, P Schmid, A Bartel - ACM Computing Surveys, 2023 - dl.acm.org
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …

The decentralized autonomous organization and governance issues

UW Chohan - Decentralized Autonomous Organizations, 2017 - taylorfrancis.com
The aim of this chapter is to consider the prominence of “governance” issues in the domain
of decentralized autonomous organizations (DAOs). The chapter discusses the importance …

Cryptocurrencies: A brief thematic review

UW Chohan - Available at SSRN 3024330, 2022 - papers.ssrn.com
Cryptocurrencies are an area of heightened pecuniary, numismatic, technological, and
investment interest, and yet a comprehensive understanding of their theories and …

Why do people choose to continue using cryptocurrencies?

KS Al-Omoush, AM Gomez-Olmedo… - … Forecasting and Social …, 2024 - Elsevier
This study empirically explores the determinants that impact the intention to continue using
cryptocurrencies. It also examines the potential impact of financial literacy on the perceived …

Improving the cryptocurrency price prediction performance based on reinforcement learning

Z Shahbazi, YC Byun - IEEE Access, 2021 - ieeexplore.ieee.org
During recent developments, cryptocurrency has become a famous key factor in financial
and business opportunities. However, the cryptocurrency investment is not visible regarding …

On the vital aspects and characteristics of cryptocurrency—A survey

AFMS Shah, MA Karabulut, AFMS Akhter… - Ieee …, 2023 - ieeexplore.ieee.org
Cryptocurrencies acquire user confidence by making the whole creation and transaction
history transparent to the public. In exchange, the transaction history accurately captures the …

[HTML][HTML] Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arXiv preprint arXiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

Illuminating the dark corners: a qualitative examination of cryptocurrency's risk

K Mehta, S Chawla - Digital Policy, Regulation and Governance, 2024 - emerald.com
Purpose The study provides a comprehensive understanding of the issues and illegal
activities related to cryptocurrencies and their negative repercussions. This study aims to …

BCPIS: Blockchain-based counterfeit product identification system

M Mhatre, H Kashid, T Jain… - Journal of Applied Security …, 2023 - Taylor & Francis
A key aspect of sustainable business development involves protecting a company's products
from counterfeiting. Since this can impact brand's image and often, product counterfeits are …