Fortifying the blockchain: A systematic review and classification of post-quantum consensus solutions for enhanced security and resilience

J Gomes, S Khan, D Svetinovic - IEEE Access, 2023 - ieeexplore.ieee.org
The inherent security and computational demands of classical consensus protocols are
often presumed impervious to various forms of attack. However, quantum computing …

Basesap: Modular stealth address protocol for programmable blockchains

A Wahrstätter, M Solomon… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Stealth addresses represent an approach to enhancing privacy within public and distributed
blockchains, such as Ethereum and Bitcoin. Stealth address protocols employ a distinct …

Statistical and clustering analysis of attributes of Bitcoin backbone nodes

D Xu, J Gao, L Zhu, F Gao, J Zhao - Plos one, 2023 - journals.plos.org
Bitcoin is a decentralized digital cryptocurrency. Its network is a Peer-to-peer (P2P) network
consisting of distributed nodes. Some of these nodes are always online and in this article …

Bitcoin Shared Send Transactions Untangling in Numbers

N Larionov, Y Yanovich - IEEE Access, 2023 - ieeexplore.ieee.org
Bitcoin uses an unspent transaction output (UTXO) model for coin circulation, which is
similar to the banknotes. The transaction history is publicly available and allows to trace …

The invisible arms race: digital trends in illicit goods trafficking and AI-enabled responses

I Mademlis, M Mancuso, C Paternoster… - Authorea …, 2023 - techrxiv.org
Recent trends in the modus operandi of technologically-aware criminal groups engaged in
illicit goods trafficking (eg, firearms, drugs, cultural artifacts, etc.) have given rise to …

Machine Learning on Blockchain Data: A Systematic Mapping Study

G Palaiokrassas, S Bouraga, L Tassiulas - arXiv preprint arXiv:2403.17081, 2024 - arxiv.org
Context: Blockchain technology has drawn growing attention in the literature and in practice.
Blockchain technology generates considerable amounts of data and has thus been a topic …

Blockchain-Based Countermeasures for Luxury Goods Counterfeiting: A Focused Survey

M Jevtic, S Khan, J Gomes… - 2023 Fifth International …, 2023 - ieeexplore.ieee.org
This study explores the potential of blockchain-based product authentication systems in
mitigating the proliferation of counterfeit luxury goods. By leveraging secure hardware and …

Babd: A bitcoin address behavior dataset for pattern analysis

Y Xiang, Y Lei, D Bao, T Li, Q Yang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Cryptocurrencies have dramatically increased adoption in mainstream applications in
various fields such as financial and online services, however, there are still a few amounts of …

Server-Assisted Data Sharing System Supporting Conjunctive Keyword Search for Vehicular Social Networks

H Liu, Y Ming, C Wang, Y Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Vehicular social networks (VSNs), as the convergence of social networks and vehicular ad
hoc networks, have brought many useful services to vehicle communication by collecting …

Cryptoeconomic User Behavior in the Acute Stages of Geopolitical Conflict

J Gomes, H Bernardino, AB Vieira… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Geopolitical conflicts significantly impact financial networks and systems, eg, Russia and
Ukraine. Cryptoeconomic blockchains such as Bitcoin and Ethereum were introduced as …