


default search action
IET Blockchain, Volume 4
Volume 4, Number 1, March 2024
- Linqing Xiao, Juntao Gao

, Baocang Wang
, Xuelian Li
:
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values. 1-17 - Li Ming

, Wenpeng Song, Li Ankai, Ziming Zhou, Liu Mianchen:
A research on cross-chain and interoperation methods of fusion protocol. 18-29 - Rajendra Kumar Sharma

, Ritumoni Sarma
, Neha Arora
, Vidya Sagar
:
Multisecret-sharing scheme with two-level security and its applications in blockchain. 30-42 - Henrique de Carvalho Videira

:
The offline cash puzzle solved by a local blockchain. 43-58 - Wisnu Uriawan

, Youakim Badr, Omar Hasan, Lionel Brunie:
Decentralized trustworthiness score management with smart contracts on the trustlend platform. 59-72 - Chenglong Huang

, Erwu Liu
, Rui Wang
, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han:
Personalized federated learning via directed acyclic graph based blockchain. 73-82 - Junfeng An

, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang:
A blockchain database system for a rail transit equipment system. 83-100
Volume 4, Number 2, 2024
- Hanjie Wu

, Qian Yao
, Zhenguang Liu, Butian Huang, Yuan Zhuang, Huayun Tang, Erwu Liu:
Blockchain for finance: A survey. 101-123 - Surbhi Sharma

, Rudresh Dwivedi:
A survey on blockchain deployment for biometric systems. 124-151 - Nikolaos Kapsoulis

, Alexandros Psychas, Antonios Litke, Theodora A. Varvarigou:
Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing. 152-168 - Valli S. Kumar

, John J. Lee, Qin Hu:
Non-fungible token-based health record marketplace. 169-184 - Shibao Chen

, Fei Li:
Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification. 185-196 - Caimei Wang

, Yudong Ren, Zhize Wu:
Multi-hop anonymous payment channel network based on onion routing. 197-208 - Minghao Lee

, Binhao Ma, Di Han, Dejun Wang, Bo Meng:
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator. 209-221
Volume 4, Number 3, 2024
- Jiajing Wu

, Hongning Dai
, Qi Xuan, Radoslaw Michalski, Xi Chen
:
Blockchain transaction data mining and its applications. 223-225 - Ao Xiong, Yuanzheng Tong

, Chengling Jiang, Shaoyong Guo, Sujie Shao, Jing Huang, Wei Wang, Baozhen Qi:
Ethereum phishing detection based on graph neural networks. 226-234 - Zijun Feng

, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang
:
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts. 235-251 - Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chaurasia

, Vinay Chamola
:
QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0. 252-262 - Ivan Tuma, Edouard Lansiaux

:
Folding at home: Artificial intelligence and crypto symbiosis for the science. 263-275 - Muyun Gao

, Shenwen Lin, Xin Tian, Xi He
, Ketai He, Shifeng Chen:
A bitcoin service community classification method based on Random Forest and improved KNN algorithm. 276-286
Volume 4, Number 4, 2024
- Aarju Dixit

, Aditya Trivedi, W. Wilfred Godfrey:
A survey of cyber attacks on blockchain based IoT systems for industry 4.0. 287-301 - Desh Deepak Sharma

:
Asynchronous blockchain-based federated learning for tokenized smart power contract of heterogeneous networked microgrid system. 302-314 - Shusheng Guo

, Cheng Chen, Qing Tong:
Secure data sharing technology of medical privacy data in the Web 3.0. 335-343 - Li Wei, Liang Peili, Li Fei:

zk-STARKs based scheme for sealed auctions in chains. 344-354 - Lifna Challissery Samu

, Neelkanth Khithani
, Kushl Alve
, Vedang Gambhire
, Atharva Hande
, Shivam Choubey:
Blockchain based intelligent disbursement in National Scholarship Portal. 407-422 - Bohan Kang

, Ning Zhang, Jianming Zhu:
Data-sharing strategies in medical consortium based on master-slave multichain and federated learning. 470-481 - Dongsheng Hou

, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao:
An on-chain trading model of real world asset backed digital assets. 315-323 - Yun-Cheng Tsai

, Jiun-Yu Huang, Da-Ru Chiou:
Empowering young learners to explore blockchain with user-friendly tools: a method using Google Blockly and NFTs. 324-334 - Yunwei Cao

, Ting Yang, Yu Wang, Gang Mao:
MEchain - A novel mode to improve blockchain's real-time and throughput. 355-364 - Xutian Wang, Yan Hong, Xiaoming He

:
Exploring artificial intelligence generated content (AIGC) applications in the metaverse: Challenges, solutions, and future directions. 365-378 - Junjie Huang

, Liang Tan
, Jianmei Xiao:
RON-based cross-chain routing optimization strategy in metaverse. 379-392 - Yuzhou Chen

, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song:
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain. 393-406 - Cindy Handoko Tantowibowo, Wei-Chuen Yau

:
ArtProtect: Blockchain and NFC-based anti-counterfeit system for physical art. 423-442 - Dongmei Li

, Xiaohui Ke, Xiaomei Zhang, Yujin Zhang:
A trusted and regulated data trading scheme based on blockchain and zero-knowledge proof. 443-455 - Joseph D. Preece

, Christopher R. Morris, John M. Easton
:
Leveraging ontochains for distributed public transit ticketing: An investigation with the system for ticketing ubiquity with blockchains. 456-469
Volume 4, Number S1, 2024
- Xin Zhou

, Lin Yang, Linru Ma, Huasen He:
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain. 483-493 - Jing Lu

, Weidong Yu
, Shihong Wu:
Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain. 494-506 - James A. Cunningham

, Nigel Davies
, Sarah Devaney
, Søren Holm, Mike Harding, Victoria Neumann
, John D. Ainsworth
:
The application of distributed autonomous organization governance mechanisms to civic medical data management. 507-525 - Himani Saraswat

, Mahesh Manchanda, Sanjay Jasola:
An efficient secure predictive demand forecasting system using Ethereum virtual machine. 526-542 - Fei He

, Fei Li, Peili Liang:
Enhancing smart contract security: Leveraging pre-trained language models for advanced vulnerability detection. 543-554 - Haotian Yuan

, Fei Li, Renhong Diao, Ting Shu:
Double-layer Byzantine fault-tolerant grouping consensus algorithm based on raft. 555-569 - Licheng Lin

, Senshan Pan, Pujie Jing
, Xiangmei Song:
Leveraging dual-blockchain collaboration for logistics supply chain supervision. 570-585 - Jincheng Ma

, Fei Li:
Research on transaction privacy protection solutions for cross-border commerce. 586-595 - Sakib Al Jobaid, Upama Kabir, Mosarrat Jahan

:
Scalable data management in global health crises: Leveraging blockchain technology. 596-615 - Payman Rezaei

, Masoud Aliakbar Golkar:
Multi-objective energy management system for multi-microgrids using blockchain miners: A two-stage peak shaving and valley filling framework. 616-631 - Jingqi Yang

, Hanqing Li:
A blockchain-based user authorization management method for information exchanging of federation of industry and commerce. 632-643 - Muhammad Faheem

, Basit Raza, Muhammad Shoaib Bhutta, Syed Hamid Hussain Madni:
A blockchain-based resilient and secure framework for events monitoring and control in distributed renewable energy systems. 644-658 - Marlene Koelbing, Klaus Kieseberg

, Ceren Çulha, Bernhard Garn
, Dimitris E. Simos:
Modelling smurfing patterns in cryptocurrencies with integer partitions. 659-680 - Yang Liu

, Jingwen Chen
, Miaomiao Zhang
, Shidong Shi
, Feng Wang
:
Serein: A parallel pipeline-based DAG schema for consensus in blockchain. 681-690 - Salman Saleem Virani

:
Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions. 691-705 - Imdad Ullah, Najm Hassan, Sukhpal Singh Gill

, Basem Suleiman
, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere:
Privacy preserving large language models: ChatGPT case study based vision and framework. 706-724

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














