[HTML][HTML] Approaches towards blockchain innovation: A survey and future directions

D Guru, S Perumal, V Varadarajan - Electronics, 2021 - mdpi.com
A blockchain is a decentralized peer to peer platform which provides security services based
on some key concepts, namely authentication, confidentiality, integrity and authorization. It is …

[HTML][HTML] Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey

D Pöhn, M Grabatin, W Hommel - Applied Sciences, 2023 - mdpi.com
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …

[HTML][HTML] Effective selfish mining defense strategies to improve bitcoin dependability

C Zhou, L Xing, Q Liu, H Wang - Applied Sciences, 2022 - mdpi.com
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an
emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining …

Bitcoin selfish mining modeling and dependability analysis

C Zhou, L Xing, J Guo, Q Liu - International Journal of …, 2022 - digitalcommons.odu.edu
Blockchain technology has gained prominence over the last decade. Numerous
achievements have been made regarding how this technology can be utilized in different …

[HTML][HTML] Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG

J Hu, Z Jiang, C Xu - International Journal of Intelligent Systems, 2023 - hindawi.com
Bitcoin-NG is an extensible blockchain protocol based on the same trust model as Bitcoin. It
divides each epoch into one keyblock and multiple microblocks, effectively improving the …

A Tree-Mapped Taxonomy of Blockchain Attacks

E Lubes, JM Pelletier - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
Blockchains provide decentralized data storage and have gained popularity over the past
decade. Their popularity has led to a multitude of attacks in research and practice. We …