Blockchain security attacks, challenges, and solutions for the future distributed iot network

S Singh, ASMS Hosen, B Yoon - Ieee Access, 2021 - ieeexplore.ieee.org
Blockchain technology is becoming increasingly attractive to the next generation, as it is
uniquely suited to the information era. Blockchain technology can also be applied to the …

Security aspects of cryptocurrency wallets—a systematic literature review

S Houy, P Schmid, A Bartel - ACM Computing Surveys, 2023 - dl.acm.org
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …

Social commerce as a driver to enhance trust and intention to use cryptocurrencies for electronic payments

JC Mendoza-Tello, H Mora, FA Pujol-López… - Ieee …, 2018 - ieeexplore.ieee.org
The deployment of cryptocurrencies in e-commerce has reached a significant number of
transactions and continuous increases in monetary circulation; nevertheless, they face two …

Disruptive innovation of cryptocurrencies in consumer acceptance and trust

JC Mendoza-Tello, H Mora, FA Pujol-López… - Information Systems and …, 2019 - Springer
Cryptocurrencies have the potential to become a disruptive innovation because they define
a new paradigm: the decentralization of trust in secure electronic transactions without the …

A survey on privacy protection of blockchain: the technology and application

D Wang, J Zhao, Y Wang - IEEE Access, 2020 - ieeexplore.ieee.org
As a kind of point-to-point distributed public ledger technology, blockchain has been widely
concerned in recent years. The privacy protection of blockchain technology has always been …

A systematic literature review on the security and privacy of the blockchain and cryptocurrency

A Hassan, MZ Mas' ud, WM Shah… - OIC-CERT Journal of …, 2020 - oic-cert.org
Throughout the years, the appearance of cyber warfare and information warfare have
changed and enhanced the methods, techniques, as well as the tools strategically, in the …

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies

X Feng, J Ma, H Wang, Y Miao, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The surging interest in cryptocurrency has revitalized the research for digital signature
schemes with strong security. In particular, signature schemes are investigated to resist the …

Blockchain security hole: issues and solutions

N Suhaliana bt Abd Halim, MA Rahman, S Azad… - Recent Trends in …, 2018 - Springer
Blockchain technology is widely known because it is the underlying technology used by the
bitcoin. It became more popular because it also can be used as backbone for various …

[PDF][PDF] A solution towards eliminating transaction malleability in bitcoin

U Rajput, F Abbas, H Oh - Journal of Information Processing …, 2018 - koreascience.kr
Bitcoin is a decentralized crypto-currency, which is based on the peer-to-peer network, and
was introduced by Satoshi Nakamoto in 2008. Bitcoin transactions are written by using a …

A Multi-Signature Scheme for Defending Malleability Attack on DeFi

C Zhang, W Liao, X Liu, H Wu, MJF Alenazi - IEEE Access, 2025 - ieeexplore.ieee.org
Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because
they ensure the security and integrity of transactions and smart contracts. Due to the …