vibrant 发表于 2025-3-26 21:35:22
http://reply.papertrans.cn/29/2820/281914/281914_31.pngheadlong 发表于 2025-3-27 04:47:25
Conference proceedings 2024, 2023..The 8 full papers and the short paper included in this volume were carefully reviewed and selected from 32 submissions. The volume focuses on current systems and new solutions to create a scientific background for a solid development of innovative Distributed Ledger Technology application. .angina-pectoris 发表于 2025-3-27 08:54:46
http://reply.papertrans.cn/29/2820/281914/281914_33.pngMAPLE 发表于 2025-3-27 12:32:47
https://doi.org/10.1007/978-981-97-0006-6blockchain; distributed ledger; smart contract; nft; web3; cryptocurrency; consensus; privacy; formal methodCorroborate 发表于 2025-3-27 15:18:55
http://reply.papertrans.cn/29/2820/281914/281914_35.png手势 发表于 2025-3-27 20:47:08
,One-Phase Batch Update on Sparse Merkle Trees for Rollups,mbership and non-membership proofs. It has been widely used as an authenticated data structure in various applications, such as layer-2 rollups for blockchains. zkSync Lite, a popular Ethereum layer-2 rollup solution, uses a sparse Merkle tree to represent the state of the layer-2 blockchain. The ac搜集 发表于 2025-3-28 01:40:40
,On the Relevance of Blockchain Evaluations on Bare Metal,s evaluation was conducted with the recent Diablo benchmark suite [.], a framework to evaluate the performance of different blockchains on the same ground. By tuning network delays in our controlled environment we were able to reproduce performance trends obtained in geo-distributed settings, henceARBOR 发表于 2025-3-28 05:09:32
,EVM-Vale: Formal Verification of EVM Bytecode Using Vale,rding smart contract developers higher-level language and reasoning features. We encode EVM-R (a subset of EVM semantics and instruction set) into F*, and raise the EVM-R into Vale design-by-contract components in an intermediate language supporting conditional logic. The specifications of Vale proc动物 发表于 2025-3-28 07:16:14
Detecting Malicious Blockchain Transactions Using Graph Neural Networks, its misuse, primarily through the exploitation of its pseudo-anonymous characteristic. Encouraging blockchain adoption and improving security in the decentralised environment require techniques to detect wallets and/or smart contracts owned by malicious entities. Illegal activities such as dark marinfantile 发表于 2025-3-28 11:01:59
Data Sharing Using Verifiable Credentials in the Agriculture Sector,hange is driving more regulation and data compliance requirements. There are new global standards of data verification requiring agriculture to confirm to these standards for international export. This paper describes the technical implementation details of a Decentralized Agricultural Ecosystem aim