kindred 发表于 2025-3-25 06:28:21

A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchaicted to the closed consortium blockchain environment, and the end-users who do not belong to the consortium are difficult to gain access without extra authentication. Thus, architectures concerning cross-chain interaction appear, while most solutions have only limited functionalities. Moreover, few

medieval 发表于 2025-3-25 07:59:32

Data Cooperatives for Trusted News Sharing in Social Media approach to secure data management. Data cooperatives and blockchain are an excellent combination since they share fundamental features like decentralization and democratic design. In this paper, we leverage the power of blockchain to design a trusted news-sharing system for social media. We prove

相一致 发表于 2025-3-25 14:30:30

A Novel Fast Recovery Method for HT Tamper in Embedded Processore-level recovery method for HT tamper in embedded processor is proposed, which consists two units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. The former one is designed to replace original register files with backup function extra. And the latter one is composed for rollba

SHOCK 发表于 2025-3-25 18:39:20

http://reply.papertrans.cn/19/1893/189204/189204_24.png

Acetaminophen 发表于 2025-3-25 22:37:39

SoK: Can NFTs Solve the Economic Problems of Countries with Ancient Heritage? Egypt as a Case Studyat NFTs. We believe that NFTs, especially with MetaVerses, came as a bless to nations with ancient heritage that attract tourists. Online tourism existed from the year 2000, and nowadays with COVID-19 travelling restrictions along with the advance of VR/AR/XR museum tours many projects are there and

Maximize 发表于 2025-3-26 01:06:24

Scalable Smart Contracts for Linear Regression Algorithmand time-consuming. In this work, we propose a novel implementation of smart contracts for linear regression algorithms with fraction-based computation that can train and predict on the Ethereum blockchain. Our smart contract-based training and prediction technique with Solidity programming language

unstable-angina 发表于 2025-3-26 04:59:48

A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabricntinuous double auction mechanism to solve the possible malicious bidding problem. In addition, the multi-signed address wallet is used to ensure the transaction security of users without a trusted center. Finally, the security and feasibility analysis of the paper proves the effectiveness of the sc

thrombus 发表于 2025-3-26 11:55:48

An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and utsourced multi-authority attribute-based encryption with dynamicity and auditing (OMADA-ABE), which makes the system more practical and more flexible. Our solution can support the dynamic changes of the system as well as the auditing of outsourced decryption information to solve the above-mentioned

杀虫剂 发表于 2025-3-26 13:00:13

A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchae improve the existing cross-chain network architectures to further protect the consortium members’ privacy. Also, the communication and the transactions of the cross-chain interaction are protected and auditable. Concrete protocols are proposed, and security models and corresponding analyses are in

callous 发表于 2025-3-26 17:01:23

http://reply.papertrans.cn/19/1893/189204/189204_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Blockchain Technology and Emerging Technologies; Second EAI Internati Weizhi Meng,Wenjuan Li Conference proceedings 2023 ICST Institute for