Verifiable delay function and its blockchain-related application: A survey

Q Wu, L Xi, S Wang, S Ji, S Wang, Y Ren - Sensors, 2022 - mdpi.com
The concept of verifiable delay functions has received attention from researchers since it
was first proposed in 2018. The applications of verifiable delay are also widespread in …

A secure big data storage framework based on blockchain consensus mechanism with flexible finality

A Sasikumar, L Ravi, K Kotecha, A Abraham… - IEEE …, 2023 - ieeexplore.ieee.org
Data security and integrity are becoming increasingly important as the volume of data being
created and stored grows. A controlled third party that provides most of the existing big data …

Revolutionizing Economic Growth Analysis: a Novel Computational Approach to Assessing the Influence of Technological Financial Efficiency on Real Economic …

C Jiang - Journal of the Knowledge Economy, 2024 - Springer
In the pursuit of comprehending the intricate relationship between scientific and
technological financial efficiency and real economic growth, traditional methodologies have …

Blockchain‐Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach

RS Vairagade, P Parkhi, Y Hande… - Concurrency and …, 2025 - Wiley Online Library
The rapid advancement of financial technology (FinTech) has led to the integration of
advanced technologies like data science, blockchain, cloud computing, and artificial …

Systematic selection of blockchain platforms using fuzzy AHP-TOPSIS

SB Muradi - 2022 - search.proquest.com
Various businesses and industries such as financial, medical care management, supply
chain management, systematic instruction, data management, fundraising platforms, Internet …

Progression Towards a Safer and Private Authorization for Business Entities: Fire OAuth

DB Gayathri, M Tharunraj, R Berg… - … on Emerging Trends in …, 2023 - atlantis-press.com
There is growing interest in alternatives to conventional techniques like username and
password combinations due to the growing requirement for safe and effective authentication …