Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions

T Zhang, B Li, Y Zhu, T Han, Q Wu - Computer Communications, 2023 - Elsevier
Traditional network covert channels have become insecure due to the continuous
improvement of traffic analysis techniques. As an emerging technology combined with …

Efficient construction of verifiable timed signatures and its application in scalable payments

X Zhou, D He, J Ning, M Luo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Despite the myriad benefits offered by blockchain technology, most of them still face several
interrelated issues, such as limited transaction throughput, exorbitant transaction fees, and …

Graph-based Covert Transaction Detection and Protection in Blockchain

Z Guo, X Li, J Liu, Z Zhang, M Li, J Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Covert communication is an method that plays an important role in secure data transmission.
The technology embeds covert information into data and propagates it through covert …

D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network

A Kurt, E Erdin, K Akkaya, S Uluagac… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …

Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

M Gimenez-Aguilar, JM de Fuentes… - International Journal of …, 2023 - Springer
The permanent availability and relative obscurity of blockchains is the perfect ground for
using them for malicious purposes. However, the use of blockchains by malwares has not …

LNGate2: Secure Bidirectional IoT Micro-Payments Using Bitcoin's Lightning Network and Threshold Cryptography

A Kurt, K Akkaya, S Yilmaz… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Bitcoin has emerged as a revolutionary payment system with its decentralized ledger
concept; however it has significant problems such as high transaction fees and low …

The Hidden Enemy: A Botnet Taxonomy

S Padhiar, A Shah, R Patel - … of the International Conference on Paradigms …, 2023 - Springer
Botnet poses a persistent and well-recognized threat to all Internet users. Botnets have
developed from being a curiosity to highly sophisticated tools for illegally earning money …

[引用][C] A review of the lightning network's evolution: Unraveling its present state and the emergence of disruptive digital business models

TK Dasaklis, V Malamas - Journal of Theoretical and Applied Electronic …, 2023 - MDPI

Study and Verification of Covert Channels for Process Layer Network in Smart Substations

H Mu, J Zhang, J Xu, Y Qiu, K Li… - 2023 IEEE 7th …, 2023 - ieeexplore.ieee.org
The covert channel is a dangerous cyber-attack threat to industry control networks; however,
it is a lack of specific research for the network environment of smart substations. Existing …

Cybersecurity applications of Blockchain technologies

MM Giménez Aguilar - 2023 - e-archivo.uc3m.es
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容