MA Ferrag, L Shu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …
H Huang, W Kong, S Zhou, Z Zheng… - ACM Computing Surveys …, 2021 - dl.acm.org
To draw a roadmap of current research activities of the blockchain community, we first conduct a brief overview of state-of-the-art blockchain surveys published in the past 5 years …
Developments such as the increasing electrical energy demand, growth of renewable energy sources, cyber–physical security threats, increased penetration of electric vehicles …
Decentralized financial applications (DeFi) are a new breed of consumer-facing financial applications composed as smart contracts, deployed on permissionless blockchain …
Know your customer (KYC) processes place a great burden on banks, because they are costly, inefficient, and inconvenient for customers. While blockchain technology is often …
Blockchain technology has taken on a leading position in today's industrial applications by providing salient features and showing significant performance since its beginning …
XF Liu, XJ Jiang, SH Liu, CK Tse - Ieee access, 2021 - ieeexplore.ieee.org
Cryptocurrencies gain trust in users by publicly disclosing the full creation and transaction history. In return, the transaction history faithfully records the whole spectrum of …
Metaverse has rekindled human beings' desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats hinder us from building a …
Recent advances in the large-scale adoption of information and communication technologies in manufacturing processes, known as Industry 4.0 or Smart Manufacturing …