


default search action
IET Blockchain, Volume 4
Volume 4, Number 1, March 2024
- Linqing Xiao, Juntao Gao
, Baocang Wang
, Xuelian Li
:
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values. 1-17 - Li Ming
, Wenpeng Song, Li Ankai, Ziming Zhou, Liu Mianchen:
A research on cross-chain and interoperation methods of fusion protocol. 18-29 - Rajendra Kumar Sharma
, Ritumoni Sarma
, Neha Arora
, Vidya Sagar
:
Multisecret-sharing scheme with two-level security and its applications in blockchain. 30-42 - Henrique de Carvalho Videira
:
The offline cash puzzle solved by a local blockchain. 43-58 - Wisnu Uriawan
, Youakim Badr, Omar Hasan, Lionel Brunie:
Decentralized trustworthiness score management with smart contracts on the trustlend platform. 59-72 - Chenglong Huang
, Erwu Liu
, Rui Wang
, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han:
Personalized federated learning via directed acyclic graph based blockchain. 73-82 - Junfeng An
, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang:
A blockchain database system for a rail transit equipment system. 83-100
Volume 4, Number 2, 2024
- Hanjie Wu
, Qian Yao
, Zhenguang Liu, Butian Huang, Yuan Zhuang, Huayun Tang, Erwu Liu:
Blockchain for finance: A survey. 101-123 - Surbhi Sharma
, Rudresh Dwivedi:
A survey on blockchain deployment for biometric systems. 124-151 - Nikolaos Kapsoulis
, Alexandros Psychas, Antonios Litke, Theodora A. Varvarigou:
Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing. 152-168 - Valli S. Kumar
, John J. Lee, Qin Hu:
Non-fungible token-based health record marketplace. 169-184 - Shibao Chen
, Fei Li:
Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification. 185-196 - Caimei Wang
, Yudong Ren, Zhize Wu:
Multi-hop anonymous payment channel network based on onion routing. 197-208 - Minghao Lee
, Binhao Ma, Di Han, Dejun Wang, Bo Meng:
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator. 209-221
Volume 4, Number 3, 2024
- Jiajing Wu
, Hongning Dai
, Qi Xuan, Radoslaw Michalski, Xi Chen
:
Blockchain transaction data mining and its applications. 223-225 - Ao Xiong, Yuanzheng Tong
, Chengling Jiang, Shaoyong Guo, Sujie Shao, Jing Huang, Wei Wang, Baozhen Qi:
Ethereum phishing detection based on graph neural networks. 226-234 - Zijun Feng
, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang:
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts. 235-251 - Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chaurasia, Vinay Chamola
:
QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0. 252-262 - Ivan Tuma, Edouard Lansiaux
:
Folding at home: Artificial intelligence and crypto symbiosis for the science. 263-275 - Muyun Gao
, Shenwen Lin, Xin Tian, Xi He
, Ketai He, Shifeng Chen:
A bitcoin service community classification method based on Random Forest and improved KNN algorithm. 276-286
Volume 4, Number 4, 2024
- Aarju Dixit
, Aditya Trivedi, W. Wilfred Godfrey:
A survey of cyber attacks on blockchain based IoT systems for industry 4.0. 287-301 - Desh Deepak Sharma
:
Asynchronous blockchain-based federated learning for tokenized smart power contract of heterogeneous networked microgrid system. 302-314 - Shusheng Guo
, Cheng Chen, Qing Tong:
Secure data sharing technology of medical privacy data in the Web 3.0. 335-343 - Li Wei, Liang Peili, Li Fei:
zk-STARKs based scheme for sealed auctions in chains. 344-354 - Lifna Challissery Samu
, Neelkanth Khithani
, Kushl Alve
, Vedang Gambhire
, Atharva Hande
, Shivam Choubey:
Blockchain based intelligent disbursement in National Scholarship Portal. 407-422 - Bohan Kang
, Ning Zhang, Jianming Zhu:
Data-sharing strategies in medical consortium based on master-slave multichain and federated learning. 470-481 - Dongsheng Hou
, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao:
An on-chain trading model of real world asset backed digital assets. 315-323 - Yun-Cheng Tsai
, Jiun-Yu Huang, Da-Ru Chiou:
Empowering young learners to explore blockchain with user-friendly tools: a method using Google Blockly and NFTs. 324-334 - Yunwei Cao
, Ting Yang, Yu Wang, Gang Mao:
MEchain - A novel mode to improve blockchain's real-time and throughput. 355-364 - Xutian Wang, Yan Hong, Xiaoming He
:
Exploring artificial intelligence generated content (AIGC) applications in the metaverse: Challenges, solutions, and future directions. 365-378 - Junjie Huang
, Liang Tan
, Jianmei Xiao:
RON-based cross-chain routing optimization strategy in metaverse. 379-392 - Yuzhou Chen
, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song:
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain. 393-406 - Cindy Handoko Tantowibowo, Wei-Chuen Yau
:
ArtProtect: Blockchain and NFC-based anti-counterfeit system for physical art. 423-442 - Dongmei Li
, Xiaohui Ke, Xiaomei Zhang, Yujin Zhang:
A trusted and regulated data trading scheme based on blockchain and zero-knowledge proof. 443-455 - Joseph D. Preece
, Christopher R. Morris, John M. Easton
:
Leveraging ontochains for distributed public transit ticketing: An investigation with the system for ticketing ubiquity with blockchains. 456-469
Volume 4, Number S1, 2024
- Xin Zhou
, Lin Yang, Linru Ma, Huasen He:
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain. 483-493 - Jing Lu
, Weidong Yu
, Shihong Wu:
Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain. 494-506 - James A. Cunningham
, Nigel Davies
, Sarah Devaney
, Søren Holm, Mike Harding, Victoria Neumann
, John D. Ainsworth
:
The application of distributed autonomous organization governance mechanisms to civic medical data management. 507-525 - Himani Saraswat
, Mahesh Manchanda, Sanjay Jasola:
An efficient secure predictive demand forecasting system using Ethereum virtual machine. 526-542 - Fei He
, Fei Li, Peili Liang:
Enhancing smart contract security: Leveraging pre-trained language models for advanced vulnerability detection. 543-554 - Haotian Yuan
, Fei Li, Renhong Diao, Ting Shu:
Double-layer Byzantine fault-tolerant grouping consensus algorithm based on raft. 555-569 - Licheng Lin
, Senshan Pan, Pujie Jing
, Xiangmei Song:
Leveraging dual-blockchain collaboration for logistics supply chain supervision. 570-585 - Jincheng Ma
, Fei Li:
Research on transaction privacy protection solutions for cross-border commerce. 586-595 - Sakib Al Jobaid, Upama Kabir, Mosarrat Jahan
:
Scalable data management in global health crises: Leveraging blockchain technology. 596-615 - Payman Rezaei
, Masoud Aliakbar Golkar:
Multi-objective energy management system for multi-microgrids using blockchain miners: A two-stage peak shaving and valley filling framework. 616-631 - Jingqi Yang
, Hanqing Li:
A blockchain-based user authorization management method for information exchanging of federation of industry and commerce. 632-643 - Muhammad Faheem
, Basit Raza, Muhammad Shoaib Bhutta, Syed Hamid Hussain Madni:
A blockchain-based resilient and secure framework for events monitoring and control in distributed renewable energy systems. 644-658 - Marlene Koelbing, Klaus Kieseberg
, Ceren Çulha, Bernhard Garn
, Dimitris E. Simos:
Modelling smurfing patterns in cryptocurrencies with integer partitions. 659-680 - Yang Liu
, Jingwen Chen
, Miaomiao Zhang
, Shidong Shi
, Feng Wang
:
Serein: A parallel pipeline-based DAG schema for consensus in blockchain. 681-690 - Salman Saleem Virani
:
Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions. 691-705 - Imdad Ullah, Najm Hassan, Sukhpal Singh Gill
, Basem Suleiman
, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere:
Privacy preserving large language models: ChatGPT case study based vision and framework. 706-724

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.