debunk 发表于 2025-3-26 21:34:01
http://reply.papertrans.cn/19/1893/189233/189233_31.pngCytology 发表于 2025-3-27 04:12:41
http://reply.papertrans.cn/19/1893/189233/189233_32.png言行自由 发表于 2025-3-27 05:31:36
PoW-Based Sybil Attack Resistant Model for P2P Reputation Systemsmake better decisions in P2P systems, but Sybil attacker can obtain multiple identities and pretends to be multiple. It can control more than “one vote” to let others’ reputation change just as the attacker wants. This paper presents a Sybil attacker resistant model for P2P reputation systems by intamphibian 发表于 2025-3-27 13:17:03
Phishing Detection on Ethereum via Learning Representation of Transaction Subgraphsy phishing scams. It forces us to explore more efficient countermeasures and perspectives for better solution. Since graph modeling provides rich information for possible downstream tasks, we use a surrounding graph to model the transaction data of a target address, aiming to analyze the identity of向外才掩饰 发表于 2025-3-27 16:37:32
Detection of Smart Ponzi Schemes Using Opcode has affected the development of blockchain ecology. Smart Ponzi scheme which realized by smart contract is a new type of Ponzi scheme and running on Ethereum. It would cause more serious damage to society in less time than other Ponzi schemes. Timely and comprehensive detection of all smart Ponzi s恭维 发表于 2025-3-27 21:31:32
Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approachsmission and storage of users’ data privacy, which improves the security and reliability of processing. The non central blockchain technology uses distributed ledger technology to realize the characteristics of disintermediation, data tampering, traceability, work audit, etc. encryption algorithm is死亡 发表于 2025-3-28 00:10:01
Conference proceedings 2020cksys 2020, held in Dali, China*, in August 2020..The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections: theories and algorithms for blockchain, performance optimization of blockchain, blockchain security anFissure 发表于 2025-3-28 03:52:16
http://reply.papertrans.cn/19/1893/189233/189233_38.png毗邻 发表于 2025-3-28 09:20:26
A Blockchain-Based Distributed Authentication and Dynamic Group Key Agreement Protocolibuted authentication and dynamic group key agreement protocol. Based on blockchain technology, this protocol improves the scalability and makes it possible to track malicious members. In addition, comparison with related protocols shows that our protocol reduces computational and communication costs.变色龙 发表于 2025-3-28 13:45:05
http://reply.papertrans.cn/19/1893/189233/189233_40.png