Decentralized Autonomous Organizations (DAOs) resemble early online communities, particularly those centered around open-source projects, and present a potential empirical …
T Sharma, VC Nair, H Wang, Y Wang… - Proceedings of the CHI …, 2024 - dl.acm.org
Key management has long remained a difficult unsolved problem in the field of usable security. While password-based key derivation functions (PBKDFs) are widely used to solve …
MY Guan, Y Yu, T Sharma, MZ Huang, K Qin… - Cryptology ePrint …, 2024 - eprint.iacr.org
Stablecoins, a type of cryptocurrency pegged to another asset to maintain a stable price, have become an important part of the cryptocurrency ecosystem. Prior studies have primarily …
KZ Zhou, W Peng, Y Liu, RF Adler - arXiv preprint arXiv:2401.09025, 2024 - arxiv.org
Sensory substitution or enhancement techniques have been proposed to enable deaf or hard of hearing (DHH) people to listen to and even compose music. However, little is known …
L Zhang, Y Quan, J Cao, KZ Zhou… - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
CryptoPunks has pioneered NFT innovations in digital art, spurring discussions on NFT valuation mechanics. While early research explored the societal and ethical impacts on …
M Shakila - 2024 International Conference on IoT Based …, 2024 - ieeexplore.ieee.org
The use of blockchain technology has disrupted many industries, including finance, healthcare, and logistics. However, the use cases for blockchain technology are not limited …
Non-fungible tokens (NFTs) are unique cryptographic assets representing the ownership of digital media. NFTs have soared in popularity and trading prices. However, there exists a …
R Jain, M Karoley, A Bichpuriya… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
The research paper presents the comprehensive development of a Pi-Coin wallet, integrating blockchain, MetaMask, React, Solidity, and Python libraries to provide robust …
E Barrios Ruiz, DA Garzon Bejarano - 2024 - repository.udistrital.edu.co
Los sistemas de autenticación basados en el uso de nombres de usuario y contraseña no son suficientemente seguros, ya que no se puede verificar que la persona que utiliza estos …