• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年06月11日 41篇

文献来源

  • 25
  • 16

主题分类

      • 32
      • 2
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 32
  • 5
  • 1
  • 2
  • 1
筛选
订阅
<< 前一天 后一天 >>

Dynamic blockchain adoption for freshness-keeping in the fresh agricultural product supply chain

【Author】 Li, Yuting Tan, Chunqiao Ip, W. H. Wu, C. H.

CCF-C

【影响因子】8.665

【主题类别】

--

【Abstract】During COVID-19, the explosive growth of demand for fresh agricultural products on E-commerce platform has increased the difficulty of maintaining the greenness and freshness in delivery. The traditional cold chain de-livery is effective in keeping greenness, but its information asymmetry makes the freshness-keeping activities unable to be regulated, which may lead to the supply chain members giving up their freshness-keeping efforts. Can the blockchain technology effectively solve these problems? We consider a fresh agricultural product supply chain consisting of a supplier and an E-commerce platform (retailer). The retailer is responsible for the wholesale and sales of fresh agricultural products, and determines the blockchain adoption degree and advertising effort. The supplier is responsible for delivering fresh agricultural products to consumers, and determines the greenness investment and freshness-keeping effort. Based on the traditional and blockchain-based fresh agricultural product supply chain, we discuss the dynamic optimization of freshness-keeping effort, advertising effort, and blockchain adoption degree. Results show that the supplier will give up the freshness-keeping effort after receiving the wholesale funds in the traditional fresh agricultural product supply chain, which will naturally worsen the fresh agricultural products. When adopting blockchain technology, the supplier continues to make the freshness-keeping effort in delivery. And five specific settings are proved that blockchain is effective in maintaining freshness. But two other specific settings are determined that it is not suited for adopting blockchain. In addition, compared with the traditional fresh agricultural product supply chain, blockchain adoption can effectively reduce the freshness-keeping effort, advertising investment and goodwill for achieving the same profit margin level, and will not affect the greenness investment decision of the supplier. Our research can provide some insights into the cold chain logistics management of fresh blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fresh agricultural product supply chain; Greenness investment; Freshness -keeping; Blockchain technology

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1016/j.eswa.2022.119494

Asset correlation based deep reinforcement learning for the portfolio selection

【Author】 Zhao, Tianlong Ma, Xiang Li, Xuemei Zhang, Caiming

CCF-C

【影响因子】8.665

【主题类别】

--

【Abstract】Portfolio selection is an important application of AI in the financial field, which has attracted considerable attention from academia and industry alike. One of the great challenges in this application is modeling the correlation among assets in the portfolio. However, current studies cannot deal well with this challenge because it is difficult to analyze complex nonlinearity in the correlation. This paper proposes a policy network that models the nonlinear correlation by utilizing the self-attention mechanism to better tackle this issue. In addition, a deterministic policy gradient recurrent reinforcement learning method based on Monte Carlo sampling is constructed with the objective function of cumulative return to train the policy network. In most existing reinforcement learning-based studies, the state transition probability is generally regarded as unknown, so the value function of the policy can only be estimated. Based on financial backtest experiments, we analyze that the state transition probability is known in the portfolio, and value function can be directly obtained by sampling, further theoretically proving the optimality of the proposed reinforcement learning method in the portfolio. Finally, the superiority and generality of our approach are demonstrated through comprehensive experiments on the cryptocurrency dataset, S&P 500 stock dataset, and ETF dataset.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Portfolio selection; Deep reinforcement learning; Asset correlations

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1016/j.eswa.2023.119707

Review on security of federated learning and its application in healthcare

【Author】 Li, Hao Li, Chengcheng Wang, Jian Yang, Aimin Ma, Zezhong Zhang, Zunqian Hua, Dianbo

【影响因子】7.307

【主题类别】

--

【Abstract】Artificial intelligence (AI) has led to a high rate of development in healthcare, and good progress has been made on many complex medical problems. However, there is a lack of patient electronic medical records standards and legal and ethical requirements for patient information privacy. The fragmentation of medical data has hindered the widespread use of AI in healthcare. Federated learning has emerged to address the problem of data fragmentation, and in combination with privacy-preserving algorithms can go a long way to address privacy concerns. Federated learning can also be combined with blockchain, edge computing, and other technologies to improve security and computational efficiency. The paper combs through recent papers on federated learning and medical industry applications, outline several architectures and classification models of federated learning, researches the application of federated learning in healthcare, and analyses the advantages of federated learning in medical applications. The paper also analyzes the security of federated learning and medical applications and analyses the various risks and attacks faced by the applications. Several standard privacy protection methods are introduced, and the current stage of the application of federated learning and healthcare is discussed. Finally, a summary and outlook on the application and security of federated learning in healthcare are presented. (c) 2023 Elsevier B.V. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Healthcare; Blockchain; Privacy protection; Distributed

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1016/j.future.2023.02.021

Blockchain-Assisted Personalized Car Insurance With Privacy Preservation and Fraud Resistance

【Author】 Huang, Cheng Wang, Wei Liu, Dongxiao Lu, Rongxing Shen, Xuemin

【影响因子】6.239

【主题类别】

--

【Abstract】It is well known that auto insurance companies (ICs) use personalized car insurance (PCI) to continuously track drivers' behavior to determine their auto premiums. However, drivers inevitably have concerns about the transparency of data collection/processing and the potential privacy leakage. In this paper, we propose a new PCI scheme to achieve privacy preservation and transparency with the assistance of a consortium blockchain. Specifically, a blockchain is first established by a group of consortium members, and each IC can deploy insurance contracts on the blockchain to support public verification of data collection/processing and thus fulfill the transparency requirement. Then a verifiable and privacy-preserving driving behavior evaluation protocol is designed by tailoring partially homomorphic encryption and zero-knowledge proof techniques. Drivers can use the protocol to interact with ICs through the contracts, and ICs can learn drivers' behavior and set corresponding auto premiums by analyzing encrypted driving data. Furthermore, a third-party auditor (TPA) is authorized by drivers and ICs to audit encrypted driving data on the contracts and resist fraud attacks. We model the contract-based auditing as a recursive inspection game where TPA can minimize the number of audits to detect data fraud and penalize malicious drivers according to Nash equilibrium. Therefore, the proposed PCI scheme can guarantee that most of the collected driving data are not biased. Formal simulation-based security analysis is given to prove the security of the proposed scheme, and a proof-of-concept prototype is also developed on an open-source blockchain to demonstrate the feasibility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicles; Insurance; Behavioral sciences; Integrated circuit modeling; Blockchains; Safety; Privacy; Blockchain; data auditing; fraud resistance; personalized car insurance; privacy preservation

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/TVT.2022.3215811

INNOVATION UNDER AN UMBRELLA: HOW CAN BLOCKCHAIN CONTRIBUTE TO CORPORATE INNOVATION IN THE AGE OF GLOBALIZATION

【Author】 Zhang, Runze Chen, Xi LI, Zhijun Qiu, Peiyang

【影响因子】5.656

【主题类别】

--

【Abstract】In the age of globalization, enterprises have faced new challenges and opportunities for innovative behavior. Increasing cultural exchanges provide enterprises with a wealth of information and knowledge, but also exacerbate the risk of information loss. Therefore, information security has become an increasingly critical issue. Blockchain technology is an effective guarantee for the success of enterprise innovation in such circumstances. Enterprises can access information across national boundaries and avoid the risk of a cultural clash or a leak of information due to the security and traceability of blockchain technology. In the era of globalization, blockchain technology has become an umbrella for enterprises to exploit cultural diversity. This study presents a DDD model that illustrates how blockchain firms can benefit from cultural diversity to produce innovative products. Specifically, firms that utilize blockchain increase their innovation output by 36.17% compared to those that do not. Additionally, it explores how firms can benefit from the spillover of external knowledge and how traditional models of R&D through equipment purchases give way to new models of bringing in talent for knowledge exchange using blockchain. The model presented in this study provides a novel theoretical perspective on how emerging technologies affect corporate innovation, emphasizing the importance of blockchain technology to corporate innovation in an era of globalization with increasing cultural exchanges. It also provides a new perspective on the application of emerging technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; corporate innovation; cultural diversity; the DDD model

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.3846/tede.2023.18967

Byzantine-Fault-Tolerant Consensus via Reinforcement Learning for Permissioned Blockchain-Empowered V2X Network

【Author】 Kim, Seungmo Ibrahim, Ahmed S. S.

【影响因子】5.009

【主题类别】

区块链应用-实体经济-车联网

区块链技术-协同技术-强化学习

【Abstract】Blockchain has been forming the central piece of various types of vehicle-to-everything (V2X) network for trusted data exchange. Recently, permissioned blockchains garner particular attention thanks to their improved scalability and diverse needs from different organizations. One representative example of permissioned blockchain is Hyperledger Fabric ("Fabric"). Due to its unique execute-order procedure, there is a critical need for a client to select an optimal number of peers. The interesting problem that this paper targets to address is the tradeoff in the number of peers: a too large number will degrade scalability while a too small number will make the network vulnerable to faulty nodes. This optimization issue gets especially challenging in V2X networks due to mobility of nodes: a transaction must be executed, and the associated block must be committed before the vehicle leaves a network. To this end, this paper proposes a mechanism for selecting an optimal set of peers based on reinforcement learning (RL) to keep a Fabric-empowered V2X network impervious to dynamicity due to mobility. We model the RL as a contextual multi-armed bandit (MAB) problem. The results demonstrate the outperformance of the proposed scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fabrics; Peer-to-peer computing; Blockchains; Vehicle-to-everything; Organizations; Scalability; Reinforcement learning; Connected vehicles; blockchain; hyperledger fabric; BFT; RL; MAB

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 实验仿真

【DOI】 10.1109/TIV.2022.3168575

Design of intelligent module design for humanoid translation robot by combining the deep learning with blockchain technology

【Author】 Yang, Fan Deng, Jie

【影响因子】4.996

【主题类别】

--

【Abstract】To accelerate the deep application of deep learning in text data processing, an English statistical translation system is established and applied to the question answering of humanoid robot. Firstly, the model of machine translation based on recursive neural network is implemented. A crawler system is established to collect English movie subtitle data. On this basis, an English subtitle translation system is designed. Then, combined with sentence embedding technology, the Particle Swarm Optimization (PSO) algorithm of meta-heuristic algorithm is adopted to locate the defects of translation software. A translation robot automatic question and answer interactive module is constructed. Additionally, the hybrid recommendation mechanism based on personalized learning is built using blockchain technology. Finally, the performance of translation model and software defect location model is evaluated. The results show that the Recurrent Neural Network (RNN) embedding algorithm has certain effect of word clustering. RNN embedded model has a strong ability to process short sentences. The strongest translated sentences are between 11 and 39 words long, while the weakest translated sentences are between 71 and 79 words long. Therefore, the model must strengthen the processing of long sentences, especially character-level input. The average sentence length is much longer than word-level input. The model based on PSO algorithm shows good accuracy in different data sets. This model averages better performance on Tomcat, standard widget toolkits, and Java development tool datasets than other comparison methods. The average reciprocal rank and average accuracy of the weight combination of PSO algorithm are very high. Moreover, this method is greatly affected by the dimension of the word embedding model, and the 300-dimension word embedding model has the best effect. To sum up, this study proposes a good statistical translation model for humanoid robot English translation, which lays the foundation for intelligent interaction between humanoid robots.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1038/s41598-023-31053-5

Designing an integrated blockchain-enabled supply chain network under uncertainty

【Author】 Babaei, Ardavan Khedmati, Majid Jokar, Mohammad Reza Akbari Tirkolaee, Erfan Babaee

【影响因子】4.996

【主题类别】

区块链应用-实体经济-供应链

【Abstract】With the development of communication infrastructure, the design of supply chains has changed significantly. Blockchain technology, as one of the most cutting-edge technologies, can promote transparency among members of the supply chain network. To the best of our knowledge, this is the first study that tries to develop a novel bi-objective optimization model to integrate the transparency resulting from the use of blockchain for designing a three-level supply chain network. The first objective function is to minimize total cost while the second objective function seeks to maximize transparency based on the application of blockchain technology. Moreover, it is worth noting that it is the first attempt to investigate the role of a blockchain model under stochastic conditions. The bi-objectiveness and stochastic nature of the proposed model are then treated using Fuzzy Goal Programming (FGP) and Chance-Constrained programming (CCP) approaches, respectively. To tackle the problem, an improved Branch and Efficiency (B&E) algorithm is developed by incorporating transparency along with cost and service. The impacts of blockchain exclusively through transparency (Case 1) or through transparency, cost, and benefits (Case 2) in Supply Chain Design (SCD) are compared. The results demonstrated that the first case has less computational complexity and better scalability, while the second case has more transparency, less congestion, and more security. As one of the main implications, supply chain managers who are focused on cost minimization as well as transparency maximization are advised to take into account the trade-off between featuring costs and benefits of blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 理论模型

【DOI】 10.1038/s41598-023-30439-9

Stackelberg Game-Based Resource Allocation with Blockchain for Cold-Chain Logistics System

【Author】 Zhang, Yang Li, Chaoyang Xin, Xiangjun

【影响因子】3.860

【主题类别】

区块链应用-实体经济-物流领域

【Abstract】Cold-chain logistics system (CCLS) plays the role of collecting and managing the logistics data of frozen food. However, there always exist problems of information loss, data tampering, and privacy leakage in traditional centralized systems, which influence frozen food security and people's health. The centralized management form impedes the development of the cold-chain logistics industry and weakens logistics data availability. This paper first introduces a distributed CCLS based on blockchain technology to solve the centralized management problem. This system aggregates the production base, storage, transport, detection, processing, and consumer to form a cold-chain logistics union. The blockchain ledger guarantees that the logistics data cannot be tampered with and establishes a traceability mechanism for food safety incidents. Meanwhile, to improve the value of logistics data, a Stackelberg game-based resource allocation model has been proposed between the logistics data resource provider and the consumer. The competition between resource price and volume balances the resource supplement and consumption. This model can help to achieve an optimal resource price when the Stackelberg game obtains Nash equilibrium. The two participants also can maximize their revenues with the optimal resource price and volume by utilizing the backward induction method. Then, the performance evaluations of transaction throughput and latency show that the proposed distributed CCLS is more secure and stable. The simulations about the variation trend of data price and amount, optimal benefits, and total benefits comparison of different forms show that the resource allocation model is more efficient and practical. Moreover, the blockchain-based CCLS and Stackelberg game-based resource allocation model also can promote the value of logistic data and improve social benefits.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cold-chain logistics; resource allocation; Stackelberg game; blockchain

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 实验仿真

【DOI】 10.32604/cmc.2023.037139

Relational Logging Design Pattern

【Author】 Takan, Savas Katipoglu, Gokmen

【影响因子】3.860

【主题类别】

区块链应用-实体经济-项目管理

区块链技术-协同技术-日志存储

【Abstract】Observability and traceability of developed software are crucial to its success in software engineering. Observability is the ability to comprehend a system's internal state from the outside. Monitoring is used to determine what causes system problems and why. Logs are among the most critical technology to guarantee observability and traceability. Logs are frequently used to investi-gate software events. In current log technologies, software events are processed independently of each other. Consequently, current logging technologies do not reveal relationships. However, system events do not occur independently of one another. With this perspective, our research has produced a new log design pattern that displays the relationships between events. In the design we have developed, the hash mechanism of blockchain technology enables the display of the logs' relationships. The created design pattern was compared to blockchain technology, demonstrating its performance through scenarios. It has been determined that the recommended log design pattern outperforms blockchain technology in terms of time and space for software engineering observability and traceability. In this context, it is anticipated that the log design pattern we provide will strengthen the methods used to monitor software projects and ensure the traceability of relationships.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; logging; software engineering; data structure; design pattern

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 实验仿真

【DOI】 10.32604/cmc.2023.035282

Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability

【Author】 Noreen, Tayyaba Xia, Qiufen Haider, Muhammad Zeeshan

【影响因子】3.860

【主题类别】

--

【Abstract】In the past decade, blockchain has evolved as a promising solu-tion to develop secure distributed ledgers and has gained massive attention. However, current blockchain systems face the problems of limited throughput, poor scalability, and high latency. Due to the failure of consensus algorithms in managing nodes' identities, blockchain technology is considered inappropriate for many applications, e.g., in IoT environments, because of poor scalability. This paper proposes a blockchain consensus mechanism called the Advanced DAG-based Ranking (ADR) protocol to improve blockchain scalability and throughput. The ADR protocol uses the directed acyclic graph ledger, where nodes are placed according to their ranking positions in the graph. It allows honest nodes to use the Direct Acyclic Graph (DAG) topology to write blocks and verify transactions instead of a chain of blocks. By using a three-step strategy, this protocol ensures that the system is secured against double -spending attacks and allows for higher throughput and scalability. The first step involves the safe entry of nodes into the system by verifying their private and public keys. The next step involves developing an advanced DAG ledger so nodes can start block production and verify transactions. In the third step, a ranking algorithm is developed to separate the nodes created by attackers. After eliminating attacker nodes, the nodes are ranked according to their performance in the system, and true nodes are arranged in blocks in topological order. As a result, the ADR protocol is suitable for applications in the Internet of Things (IoT). We evaluated ADR on EC2 clusters with more than 100 nodes and achieved better transaction throughput and liveness of the network while adding malicious nodes. Based on the simulation results, this research determined that the transaction's performance was significantly improved over blockchains like Internet of Things Applications (IOTA) and ByteBall.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; scalability; directed acyclic graph; advanced DAG-based ranking protocol

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.32604/cmc.2023.036139

A Survey of Federated Learning From Data Perspective in the Healthcare Domain: Challenges, Methods, and Future Directions

【Author】 Taha, Zahraa Khduair Yaw, Chong Tak Koh, Siaw Paw Tiong, Sieh Kiong Kadirgama, Kumaran Benedict, Foo Tan, Jian Ding Balasubramaniam, Yogendra A. L.

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

区块链技术-协同技术-联邦学习

【Abstract】Recent advances in deep learning (DL) have shown that data-driven insights can be used in smart healthcare applications to improve the quality of life for patients. DL needs more data and diversity to build a more accurate system. To satisfy these requirements, more data need to be pooled at the centralized server to train the model deeply, but the process of pooling faces privacy and regulatory challenges. To settle them, the concept of sharing model learning rather than sharing data through federated learning (FL) is proposed. FL creates a more reliable system without transferring data to the server, resulting in the right system with stronger security and access rights to data that protect privacy. This research aims to (1) provide a literature review and an in-depth study on the roles of FL in the fields of healthcare; (2) highlight the effectiveness of current challenges facing standardized FL, including statistical data heterogeneity, privacy and security concerns, expensive communications, limited resources, and efficiency; and (3) present lists of open research challenges and recommendations for future FL for the academic and industrial sectors in telemedicine and remote healthcare applications. An extensive review of the literature on FL from a data-centric perspective was conducted. We searched the Science Direct, IEEE Xplore, and PubMed databases for publications published between January 2018 and January 2023. A new crossover matching between the approaches that solve or mitigate all types of skewed data has been proposed to open up opportunities to other researchers. In addition, a list of various applications was organized by learning application task types such as prediction, diagnosis, and classification. We think that this study can serve as a helpful manual for academics and industry professionals, giving them guidance and important directions for future studies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical services; Security; Internet of Things; Privacy; Servers; Federated learning; Training; Energy; federated learning; non-independent identical distribution; privacy and security

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 综述

【DOI】 10.1109/ACCESS.2023.3267964

Innovative Trends in the 6G Era: A Comprehensive Survey of Architecture, Applications, Technologies, and Challenges

【Author】 Quy, Vu Khanh Chehri, Abdellah Quy, Nguyen Minh Han, Nguyen Dinh Ban, Nguyen Tien

【影响因子】3.476

【主题类别】

区块链技术-协同技术-6G

【Abstract】While the fifth-generation mobile network is being commercialized worldwide, researchers have recently started looking towards the next generation, called the 6G network. Unlike 5G and previous generations of wireless technologies designed to improve network performance for greater bandwidth, lower latency, and greater reliability, 6G ecosystems are considered a platform conducive to innovations in computing, artificial intelligence, connectivity and sensors, virtualization, and more. It is designed to meet the requirements of higher global coverage, greater spectral efficiency, and a reduced carbon footprint, emphasizing sustainability, equity, trust, and security through unprecedented architectural evolutions and technology. 6G will be an integrated network system that includes a traditional terrestrial mobile network, space network, and underwater network to provide ubiquitous network access. Even if studies on the vision of the 6G network have already been published, there is still a significant amount of ground to cover. There is no decision made yet regarding anything, and nothing has been ruled out. The focus of this study is to identify a complete picture of changes in architectures, technologies, and challenges that will shape the 6G network. The research results will provide indications for further studies on 6G ecosystems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】6G mobile communication; 5G mobile communication; Computer architecture; Internet of Things; Terminology; Security; Quantum communication; 6G; architecture; 5G new radio; mobile network; artificial intelligence; technologies; challenges

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 综述

【DOI】 10.1109/ACCESS.2023.3269297

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

【Author】 Park, Dongjun Choi, Minsig Kim, Gyusang Bae, Daehyeon Kim, Heeseok Hong, Seokhie

【影响因子】3.476

【主题类别】

--

【Abstract】Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks have been widely studied in cryptanalysis and have already been proven threatening, but analysis on hardware wallets still needs to be researched. Although the previous work demonstrated several side-channel vulnerabilities, their attacks require a finely controlled environment or a learning phase of target devices' physical properties before the attacks. This paper proposes a side-channel attack on hardware wallets extracting private keys. The proposed attack needs a single power trace measured when wallets process elliptic curve scalar multiplication with private keys. Our attack is reasonable since we do not damage the device under attack and do not target a specific device but an algorithm; it is widely applicable to wallets using that algorithm or analogous ones. It also presents the attack results conducted with three datasets: simulation, ChipWhisperer, and actual dataset collected from the Trezor Model One, the first and representative hardware wallets which comply with the de facto standard of hardware wallets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Hardware; Power systems; Cryptocurrency; Side-channel attacks; Hamming weight; Elliptic curves; Symbols; hardware security; power analysis; side-channel attack

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/ACCESS.2023.3273150

A New Efficient Method for Refining the Reinforcement Learning Algorithm to Train Deep Q Agents for Reaching a Consensus in P2P Networks

【Author】 Mallouh, Arafat Abu Qawaqneh, Zakariya Abuzaghleh, Omar Al-Rababa'A, Ahmad

【影响因子】3.476

【主题类别】

--

【Abstract】The usage of distributed Peer-to-Peer (P2P) networks has been growing steadily for a reasonable period. Various applications rely on the infrastructure of P2P networks, where nodes communicate to accomplish a task without the need for a central authority. One of the significant challenges in P2P networks is the ability of the network nodes to reach a consensus on a shared item; the challenge increases as time passes. Thus, this work proposes a new effective method for tweaking the Deep Reinforcement Learning (DRL) algorithm to train Deep Q Network (DQN) learning agents to reach a consensus among the P2P nodes. We propose various hierarchies of deep agents to address this crucial challenge in P2P networks. DRL is utilized to build and train agents; more precisely, DQN learning agents are constructed and trained. Two scenarios are proposed and evaluated. In the first scenario, one DQN agent is trained to find the consensus between the network nodes. In the second scenario, three hierarchies with different numbers of layers of agents are proposed and evaluated. In both scenarios, the P2P network used is a blockchain network. The best result was obtained using the third hierarchy of the second scenario; the overall accuracy of the model is 87.8%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Training; Q-learning; Peer-to-peer computing; Games; Behavioral sciences; Distribution networks; Deep learning; Reinforcement learning; Blockchain; consensus; deep reinforcement learning; DQN; P2P

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/ACCESS.2023.3268283

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

【Author】 Burra, Manohar Sai Maity, Soumyadev

【影响因子】3.476

【主题类别】

--

【Abstract】FOG computing enhances communication efficiency by processing data at the network's edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern. To avoid incorrect decision-making due to corrupt data, a data auditing process is mandatory. Further, a group of user entities in a CI network generate data onto a common file and outsource the file to the FOG server. Auditing such shared group data creates additional complexities. Existing shared group data auditing schemes using public key infrastructure (PKI) or identity-based cryptography (IBC) face challenges such as certificate management or key escrow problems respectively. While, certificateless cryptography (CLC) offers better security and efficiency, but many CLC-based shared group data auditing schemes lack protection against key generation center compromise. The key generation process in many of the existing shared group data auditing schemes is centralized and does not support flexible user entity admission. This paper proposes a distributed and decentralized cryptography approach to enhance the security of key generation for group members. The scheme offers flexible user admission, allowing for full or semi-membership. The proposed scheme provides efficient and secure shared group data auditing against public key replacement, metadata forgery, and integrity attacks, as shown by performance evaluation and security analysis.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Public key; Metadata; Cloud computing; Servers; Security; Edge computing; Forgery; Information sharing; Certificateless; data auditing; provable data possession; shared data

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/ACCESS.2023.3271605

A Review of Security and Privacy Concerns in the Internet of Things (IoT)

【Author】 Aqeel, Muhammad Ali, Fahad Iqbal, Muhammad Waseem Rana, Toqir A. Arif, Muhammad Auwul, Md. Rabiul

【影响因子】2.336

【主题类别】

--

【Abstract】The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications' connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code injections, and backdoor attacks. Traditional threats provide essential services such as authentication, authorization, and accountability. Authentication and authorization are the process of verifying that a subject is bound to an object. Traditional authentication and authorization mechanisms use three different factors to identity a subject to verify if the subject has the right capability to access the object. Further, it is defined that a computer virus is a type of malware. Malware includes computer viruses, worms, Trojan horses, spyware, and ransomware. There is a high probability that IoT systems can get infected with a more sophisticated form of malware and high-frequency electromagnetic waves. Purpose oriented with distinct nature IoT devices is developed to work in a constrained environment. So there is a dire need to address these security issues because relying on existing traditional techniques is not good. Manufacturers and researchers must think about resolving these security and privacy issues. Most importantly, this study identifies the knowledge and research gap in this area. The primary objective of this systematic literature review is to discuss the divergent types of threats that target IoT systems. Most importantly, the goal is to understand the mode of action of these threats and develop the recovery mechanism to cover the damage. In this study, more than 170 research articles are systematically studied to understand security and privacy issues. Further, security threats and attacks are categorized on a single platform and provide an analysis to explain how and to what extent they damage the targeted IoT systems. This review paper encapsulates IoT security threats and categorizes and analyses them by implementing a comparative study. Moreover, the research work concludes to expand advanced technologies, e.g., blockchain, machine learning, and artificial intelligence, to guarantee security, privacy, and IoT systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1155/2022/5724168

An optimized deep learning model to ensure data integrity and security in IoT based e-commerce block chain application

【Author】 Navaneethan, M. Janakiraman, S.

【影响因子】1.737

【主题类别】

--

【Abstract】E-commerce, often known as electronic commerce, is the purchasing and selling of goods over the internet using electronic devices to share data. Banks and other financial institutions are frequently added as third-party platforms to traditional e-commerce platforms. As a result, it raises issues with integrity and cyber security. We suggest a deep learning-based strategy called the Hybrid Interactive Autodidactic School-Based Teaching-Learning Optimization (HIASTLO) algorithm to address these issues. The IoT-based e-commerce blockchain is used to extract and reject the various cyberattacks in the network, and deep learning is utilised to improve the weight and bias of the neural networks. We used a variety of performance indicators, including accuracy, precision, and recall, to identify cyberattacks. We also evaluated how well our work performed when compared to previous BSIoTNET, BCFC, DRNN, DNN-KNN, MOO-FS, LRNN, and HDLM efforts. Furthermore, MudraChain and NormaChain are used to examine the transaction time of our suggested task. The results show that our suggested work performs better than any other methods and offers highly secure internet services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】E-commerce; blockchain; deep learning; cyber attacks; IoT

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.3233/JIFS-220743

Trust and Reputation Management for Blockchain-enabled IoT

【Author】 Putra, Guntur Dharma Malik, Sidra Dedeoglu, Volkan Kanhere, Salil S. Jurdak, Raja

【影响因子】

【主题类别】

--

【Abstract】In recent years, there has been an increasing interest in incorporating blockchain for the Internet of Things (IoT) to address the inherent issues of IoT, such as single point of failure and data silos. However, blockchain alone cannot ascertain the authenticity and veracity of the data coming from IoT devices. The append-only nature of blockchain exacerbates this issue, as it would not be possible to alter the data once recorded onchain. Trust and Reputation Management (TRM) is an effective approach to overcome the aforementioned trust issues. However, designing TRM frameworks for blockchain-enabled IoT applications is a non-trivial task, as each application has its unique trust challenges with their unique features and requirements. In this paper, we present our experiences in designing TRM framework for various blockchain-enabled IoT applications to provide insights and highlight open research challenges for future opportunities.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】trust; reputation; blockchain; IoT; CPS; TRM

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/COMSNETS56262.2023.10041348

CrossTrustchain: Cross-Chain Interoperability using Multivariate Trust Models

【Author】 Patel, Dhruv Anand, Harsh Chakraborty, Suchetana

【影响因子】

【主题类别】

--

【Abstract】With an exponential increase in intelligent data-driven applications in recent times, ensuring the reliability of this massive amount of data poses a great challenge. Fortunately, the advent of blockchain technologies could enable enforcing as well as managing trust in a transparent and robust manner. A trust value associated with a user or data can help prevent fraud and improve user experience. The same user or data source (an IoT device) can be a part of multiple blockchains considering the many-to-one mapping of running applications to the user (or devices) in a practical scenario. In such an ecosystem, it is important to preserve the hard-earned trust of a user across different chains. However, limited interoperability among multiple blockchains restricts the reusability and transitivity of trust realization, which would otherwise be helpful in reducing the overhead to a great extent. This naturally raises an interesting question: "How to enable a seamless flow of trust from one chain to the other without compromising the privacy of the data that would conform to the specific characteristics of individual blockchain and preserve the integrity of trust value?" In this paper, we design a novel architecture called CrossTrustchain to facilitate the interoperability of trust across different chains to address the stated problem. We also look at how the multivariate trust model can be interoperated between different chains. Finally, we conduct performance benchmarking for a banking use case scenario on Hyperledger Caliper and presented interesting results to open up newer possibilities for further research in this direction.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain interoperability; Trust interoperability; Multi-Variate trust; Trust Vectors

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/COMSNETS56262.2023.10041399

Efficient Privacy-Preserving Authentication using Blockchain for VANET

【Author】 Pariyarath, Akhil Tomar, Shubham Tripathi, Meenakshi

【影响因子】

【主题类别】

区块链应用-实体经济-车联网

区块链技术-协同技术-身份验证

区块链技术-协同技术-隐私保护

【Abstract】A vehicular Ad-hoc Network is a wireless network that provides comfort while driving and enhances safety. A tremendous amount of information is exchanged between vehicles and roadside units. While exchanging information, we should prevent others from identifying the subject of communication or learning one's location[1]. The current privacy-preserving approaches for Vehicular Ad-hoc Networks (VANETs) generally maintain many pseudonyms[2] for a single vehicle, neglecting to consider the need for a secret identity. These authentication approaches make managing pseudonyms challenging and revocation inefficient. We analyzed this issue and proposed a privacy-preserving protocol using blockchain[3]. Our proposed protocol is implemented in the Polygon testbed(i.e., Mumbai Testnet), which keeps the vehicle's identity confidential. This method reduces the verification time and cost of the vehicles when compared with other approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 实验仿真

【DOI】 10.1109/COMSNETS56262.2023.10041277

An Analysis of Trends and Problems of Information Technology Application Research in China's Accounting Field Based on CiteSpace

【Author】 Li, Xiwen Zhang, Jun Nan, Ke Niu, Xiaoye

【影响因子】

【主题类别】

--

【Abstract】By using CiteSpace software and using the number of publications, the main authors and institutions, the research topics and the research fronts as indexes, a text mining and visual analysis of the existing literature in the domestic CNKI from 2000 to 2020 is conducted. According to the development of practice, the number of researchers' research literature on the application of information technology in accounting has increased year by year, but the quality has not improved; big data, management accounting, financial sharing, cloud accounting, and blockchain technology have been in the spotlight of recent research; the Ministry of Finance, the National Accounting Institute and financial support played an important role. However, there are still challenges, such as a lack of cross-institutional and cross-regional cooperation among scholars, limited research on accounting informatization construction of SMEs, and inadequate literature on accounting education. Strengthening guidance and support, promoting cooperation and exchanges can continuously promote the mutual progress of theoretical research and practical innovation of information technology application in the field of accounting.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1007/978-981-19-7742-8_17

Multidimensional Signal Processing and Applications-New Approaches

【Author】 Kountchev, Roumen Mironov, Rumen Draganov, Ivo Kountcheva, Roumiana

【影响因子】

【主题类别】

区块链应用-实体经济-通信领域

区块链应用-实体经济-医疗领域

【Abstract】This chapter is a short introduction in the contemporary approaches aimed at the multidimensional processing and analysis of various kinds of signals, investigated in related research works, which were presented at the Third International Workshop "New Approaches for Multidimensional Signal Processing", (NAMSP), held at the Technical University of Sofia, Bulgaria in July 2022. Some of the works cover various topics, as: moving objects tracking in video sequences, automatic audio classification, representation of color video qpez 2-level tensor spectrum pyramid, etc., and also introduce multiple applications of the kind: analysis of electromyography signals, diagnostics of COVID based on ECG, etc. Short descriptions are given for the main themes covered by the book, which comprises the following three sections: multidimensional signal processing; applications of multidimensional signal processing, and applications of blockchain and network technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Multidimensional signal processing; Tensor decomposition; Deep learning; Blockchain; Medical decision support; Audio classification; Paraconsistent logic; Deep faith network model; Ant colony

【发表时间】2023

【收录时间】2023-06-11

【文献类型】 会议摘要

【DOI】 10.1007/978-981-19-7842-5_1

Data Protection in Permissioned Blockchains using Privilege Separation

【Author】 Joseph, Arun Yadav, Nikita Ganapathy, Vinod Behl, Dushyant Jayachandran, Praveen

【影响因子】

【主题类别】

--

【Abstract】This paper concerns the Hyperledger Fabric permissioned blockchain system. This system is in popular use in several enterprise settings, where each participating corporate entity may have sensitive business-related data whose confidentiality it wishes to protect. Fabric provides the channel abstraction that ensures that channel data (e.g., data stored in that channel's ledger, or data transmitted via the network to members of that channel) are only accessible to members of that channel. Unfortunately, as we show in this paper, the channel abstraction only offers data protection under the implicit assumption that all system components in the permissioned blockchain are trustworthy. This assumption may not hold in the presence of compromised container nodes, on which several blockchain-related components execute, or malicious business users inside any one of the participating corporate entities. Under such situations, sensitive corporate data can be leaked to unauthorized entities. We present Aramid, which is an enhanced version of Fabric that offers data protection even in the presence of compromised blockchain components. Aramid uses a privilege-separated architecture in which blockchain components (such as peer or orderer nodes) that are members of multiple channels execute on different containers. Aramid is transparent to legacy Fabric applications, requiring no changes to their codebase. Through our prototype implementation, we show that Aramid robustly defends against a number of attacks possible on Fabric, and that it does so with performance comparable to Fabric.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】permissioned blockchain; privilege separation; security; data leakage

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/COMSNETS56262.2023.10041304

MYOCHAIN: A Blockchain Protocol for Delay Bounded Transaction Confirmation

【Author】 Ahuja, Aditya Vigneswaran, R. Rajan, M. A. Lodha, Sachin

【影响因子】

【主题类别】

--

【Abstract】Blockchain consensus protocols are traditionally designed without consideration of transaction inclusion policies in the block payloads. This can lead to exacerbated delays in transaction inclusion and confirmation times, thereby effecting the service provided to the clients. In this contribution, we present a novel client network model and a consequential blockchain protocol called MYOCHAIN to address the problem of bounding the delays in transaction confirmation. MYOCHAIN is an amendment to the TENDERSTAKE state machine replication protocol, and guarantees a constant block height for confirmation of each transaction issued on the proposed client network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-06-11

【文献类型】

【DOI】 10.1109/COMSNETS56262.2023.10041301

基于人工智能技术的高校智慧财务系统架构研究

【作者】 董淼;

【作者单位】中国医科大学;

【文献来源】会计之友

【复合影响因子】3.676

【综合影响因子】0.776

【主题类别】

--

【摘要】人工智能等新技术已深度融合于社会的生活生产,并不断赋能各行各业。文章聚焦人工智能技术与高校财务系统的融合构建,为切实提高高校财务管理水平,更好地服务高校发展奠定基础。首先分析了区块链技术和人工智能技术应用于财务管理的可行性;其次根据高校财务管理业财融合的相关要求,构建了基于区块链技术与人工智能技术的高校财务智能化管理架构;然后利用实际业务场景对财务智能化管理架构进行了应用分析;最后提出了高校财务智能化发展的应用建议。

【关键词】区块链;;人工智能;;高校财务;;智慧财务

【文献类型】

【DOI】

【发表时间】2023-06-11

车联网中基于区块链的分布式信任管理方案

【作者】 张海波;曹钰坤;刘开健;王汝言;

【作者单位】重庆邮电大学通信与信息工程学院;先进网络与智能互联技术重庆市高校重点实验室;泛在感知与互联重庆市重点实验室;

【文献来源】通信学报

【复合影响因子】2.347

【综合影响因子】1.740

【主题类别】

--

【摘要】针对车联网中恶意车辆识别效率低、识别准确率低带来的安全问题,提出了一种基于区块链的分布式车联网信任管理方案。通过聚合车辆的评分信息,结合贝叶斯推理模型设计了一种虚假信息识别策略。联合车辆历史交互信息以及交通事件信息设计了一种声誉值更新算法,并利用声誉阈值识别恶意车辆。通过路边单元构建区块链,实现了交通数据以及车辆声誉值的分布式存储。改进了传统的工作量证明共识机制,通过事件等级与参与评分车辆数量动态改变矿工节点的出块难度,并利用等待机制,使近期出块的节点暂时停止参与矿工节点的选举过程,从而减少重复计算带来的资源消耗。仿真结果表明,所提方案能够有效识别虚假信息,抵御恶意车辆的欺骗行为,提升恶意车辆的识别效率,减少资源消耗,在车联网的分布式信任管理方面是有效可行的。

【关键词】车联网;;区块链;;信任管理;;声誉值;;共识机制

【文献类型】

【DOI】

【发表时间】2023-06-11

基于节点分组信誉模型的改进PBFT共识算法

【作者】 陈苏明;王冰;陈玉全;邢涛;马宇辉;赵建立;

【作者单位】河海大学能源与电气学院;国网上海市电力公司;

【文献来源】计算机应用研究

【复合影响因子】1.888

【综合影响因子】1.138

【主题类别】

区块链技术-核心技术-共识机制

【摘要】针对实用拜占庭容错共识算法(Practical Byzantine Fault Tolerance,PBFT)中存在通信开销大、缺少奖惩机制、节点缺乏积极性的问题,提出了一种基于节点分组信誉模型的改进PBFT共识算法(Grouping Reputation Practical Byzantine Fault Tolerance,GR-PBFT)。首先,引入信誉奖惩机制来确保系统的安全性,再根据节点信誉进行分组以选取共识节点,解决信誉机制类共识算法产生节点信誉累计问题,降低系统中心化程度,提升了节点成为共识节点的积极性;然后,改进主节点的选举方式,保证主节点的可靠性,并优化一致性协议执行流程,减少准备、确认与响应阶段的通信复杂度,提高了共识效率。最后,仿真实验表明,GR-PBFT共识算法在共识时延、通信开销、吞吐量、安全性等方面比PBFT共识算法具有更好的性能。

【关键词】区块链;;共识算法;;节点分组;;信誉奖惩机制

【文献类型】 实验仿真

【DOI】 10.19734/j.issn.1001-3695.2023.03.0091

【发表时间】2023-06-11

一种基于Schnorr签名的区块链预言机改进方案

【作者】 崔怀勇;张绍华;李超;戴炳荣;

【作者单位】上海海洋大学信息学院;上海计算机软件技术开发中心;上海商学院;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

--

【摘要】区块链预言机是一种为上链数据提供可信保障的中间件,可以有效解决链上链下数据传输的信任问题。当前预言机方案存在成本高、容错率低、密钥泄露、数据泄漏、签名失效等问题。针对这些问题,提出一种基于Schnorr门限聚合签名的区块链预言机改进方案。首先,通过引入可验证随机函数生成可验证随机数,解决了签名过程中随机数重复或能够被预测导致的密钥泄露问题。其次,通过引入可验证秘密分享,解决了签名过程中密钥分发者作恶导致的签名失效问题。预言机通过验证密钥碎片检测密钥分发者是否作恶,验证结束后便向预言机智能合约发送验证结果,当预言机智能合约收到t个验证失败的结果时向所有预言机发送消息,达成一致性共识后重启签名。此外,在数据提交阶段,当预言机身份验证通过时才允许其提交,防止了签名过程的数据泄露。并设置预言机信誉与激励机制,保证信誉较好的预言机在有效时间内参与签名并获得奖励。仿真实验结果表明,在预言机节点数量为50,密钥分发者作恶且恶意预言机占预言机群体总数近50%时,方案消耗的总时间不超过200ms,gas消耗量不超过5×10~(5 )wei,可以有效地实现可信数据上链。

【关键词】区块链预言机;;Schnorr签名;;门限聚合机制;;可验证随机函数;;可验证秘密分享

【文献类型】

【DOI】 10.19678/j.issn.1000-3428.0067050

【发表时间】2023-06-11

NFT数字作品交易信息网络传播权规制路径的证成与完善

【作者】 姚叶;任文璐;

【作者单位】中南财经政法大学知识产权研究中心、知识产权学院;

【文献来源】新闻界

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】NFT数字作品交易作为区块链技术与智能合约技术衍生出的一种新型商业模式,在丰富数字经济样态、促进文创产业发展等方面展现出独特价值。然而,如何界定NFT的法律属性,怎样有效规制未经著作权人授权而擅自将其作品非同质代币化并进行出售的行为,成为著作权法领域亟待回应的问题。对此,应当将NFT视作访问作品的网络链接和法律上的访问权利凭证,出售擅自铸造的NFT数字作品的行为构成对信息网络传播权的间接侵权。与此同时,应在立法层面坚持发行权“作品载体所有权转移”之要件,在司法层面正确适用“向公众传播作品”要件和著作权侵权主观要件,以更好地治理NFT数字作品交易市场。

【关键词】非同质化代币;;网络链接;;权利凭证;;信息网络传播权

【文献类型】

【DOI】 10.15897/j.cnki.cn51-1046/g2.20230526.001

【发表时间】2023-06-11

基于区块链的土地数据存储模型

【作者】 宋罗娜;路子逵;邓清;张强;王小娟;

【作者单位】北京信息科技大学经济管理学院;北京邮电大学电子工程学院;北京新五好农业科技有限公司;

【文献来源】北京邮电大学学报

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】针对土地测绘场景下数据难溯源、易篡改问题,提出了一种基于区块链的土地数据存储模型,以实现土地调查数据的链上存储以及链上链下数据关联检索。首先,设计了针对土地测绘数据的上链压缩算法;其次,提出了基于分布式存储与纠删码的分布式数字指纹生成方法,并对生成方式进行并发优化,以加速数字指纹生成与数据存储过程;最后,模型引入了链上链下数据关联,进一步保障数据安全。仿真实验结果表明,基于区块链的土地数据存储模型能够有效节省存储空间,防止数据篡改,实现大规模点云数据高效上链,提高了数据安全性和可信性。

【关键词】区块链;;土地测绘;;数据存储;;存储模型

【文献类型】

【DOI】 10.13190/j.jbupt.2022-087

【发表时间】2023-06-11

基于区块链的高校校际联盟图书资源共享系统

【作者】 王锋;刘琳琳;刘扬;白浩;张强;

【作者单位】河南工业大学信息科学与工程学院;河南工业大学粮食信息处理与控制教育部重点实验室;河南工业大学学报编辑部;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】针对高校图书馆资源共享建设中存在的信息孤岛、重复建设、资源利用率低等问题,提出基于区块链技术构建校际联盟图书资源共享系统,通过智能合约定制校校双方、多方之间灵活多变的图书租借策略,周期性完成租借清算;通过API接口与校内图书管理系统进行无缝对接,实现链上租借流程的自动化和可追溯。该系统利用区块链技术的信任构建优势,完善高校图书馆之间的共享模式,提高了图书资源利用的边际效应,可有效激发高校图书共享的内生动力。

【关键词】区块链;;资源共享;;智能合约;;图书馆

【文献类型】

【DOI】

【发表时间】2023-06-11

基于矿工的改进哈希时间锁定协议

【作者】 左宇轩;强振平;代飞;苏世琪;梁志宏;

【作者单位】西南林业大学大数据与智能工程学院;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】要:针对哈希时间锁定协议无法实现跨链资产转移的问题,提出一种基于矿工的改进哈希时间锁定跨链交互协议。首先,在原子交换过程中加入了椭圆曲线加密算法,该算法使矿工在目标链上安全的生成与锁定交易,以完成用户的跨链资产转移;然后,在协议中加入了矿工节点的竞争选取算法与奖惩算法,以实现一种新的币信证明共识机制;最后,对协议中的智能合约及其功能函数进行了详细阐述。在以太坊私链平台上进行仿真实验,结果表明该协议可安全地完成跨链资产转移,有效地激励矿工积极参与跨链交易。

【关键词】区块链;;跨链;;哈希时间锁定协议;;资产转移;;椭圆曲线加密;;共识机制

【文献类型】

【DOI】

【发表时间】2023-06-11

基于区块链的综合能源系统低碳优化调度研究

【作者】 孟明;商聪;马思源;赵慧婷;

【作者单位】新能源电力系统国家重点实验室(华北电力大学);

【文献来源】华北电力大学学报(自然科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】综合能源系统对实现能源可持续发展和构建绿色低碳社会具有重要的应用价值。针对综合能源系统调度过程中存在的发用电预测误差大、系统优化数据采集处理复杂和经济运行成本较高等问题,将区块链技术引入到综合能源系统优化调度中,并计及电、热、冷三种负荷综合需求响应和碳排放交易,调用智能合约,以系统经济性和环保性最优为目标,提出了适用于综合能源系统的低碳优化调度模型。利用区块链技术特性,构建了面向综合能源系统优化调度的总体架构,使得区块链网络成为整个综合能源系统信息交互与数据存储中心,同时保留了调度中心的部分导向作用,确保了电网的安全、稳定运行。仿真结果表明:区块链技术可以进一步挖掘综合能源系统数据价值,更好地实现信息交流透明性;同时,构建的综合能源系统的低碳优化调度模型能够有效提高系统供能的灵活性、运行的经济性以及环保性。

【关键词】综合能源系统;;区块链;;综合需求响应;;碳交易;;优化调度

【文献类型】

【DOI】

【发表时间】2023-06-11

能源互联网中数字人民币的典型应用场景研究

【作者】 毕晓蓉;王惠;李志杰;

【作者单位】国网江苏省电力有限公司;江苏鑫顺能源产业集团;

【文献来源】中国商论

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】本文在文献综述的基础上,从数字人民币的特性分析入手,结合能源互联网发展的需求和国网在推进数字人民币试点方面的实践,总结、归纳在能源互联网中应用数字人民币的典型场景,包括微电网、清洁能源消纳、超级电池等场景,并分析数字人民币在这些典型场景中的落地路径。本文从数字人民币与能源互联网深嵌的角度入手,一方面,利用数字人民币的独特优势加快能源互联网的形成;另一方面,利用能源转型和建设能源互联网的历史机遇,拓展数字人民币的应用场景,加快其落地使用。

【关键词】数字人民币;;能源互联网;;应用场景;;微电网;;双碳

【文献类型】

【DOI】 10.19699/j.cnki.issn2096-0298.2023.10.066

【发表时间】2023-06-11

法定数字货币对普惠金融的影响研究

【作者】 李卓恒;

【作者单位】苏州科技大学;

【文献来源】时代经贸

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】法定数字货币是21世纪的一个新兴概念,最初起源于中本聪提出的比特币这一数字货币概念。我国于2014年正式开始对法定数字货币的研究,于2020年开始进行法定数字货币的落地试点。普惠金融旨在为那些缺乏金融资源的人群提供金融服务,尤其是低收入群体和小微企业。但由于基础设施落后、相关金融知识匮乏等原因,并不能使得普惠金融的优惠真正下沉至基层,从而造成群众未能真正享受普惠金融所能带来的普惠性。法定数字货币可以凭借其数字特征,将普惠金融渗透至金融服务不发达的地区。本文主要阐述法定数字货币对普惠金融的影响,以及法定数字货币在推进普惠金融发展的过程中可能存在的问题,并针对问题提出相关建议。

【关键词】法定数字货币;;普惠金融;;数字普惠金融

【文献类型】

【DOI】 10.19463/j.cnki.sdjm.2023.05.030

【发表时间】2023-06-11

区块链技术在国际贸易支付中的应用

【作者】 李娜;

【作者单位】金华开放大学;

【文献来源】时代经贸

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】在现代化信息技术的不断发展下,衍生出了区块链技术,而且被广泛应用于金融、跨境支付等行业,其作用也愈加凸显。在国际贸易支付中运用区块链技术,不仅提升了支付效率,而且其安全性也比传统的支付方式更有保障。然而,区块链技术与国际贸易支付相结合的发展时间尚短,还存在较多明显的问题,如何提升国际贸易支付中区块链技术的应用,成为当前非常热门的研究课题。对此,本文在阐述国际贸易支付领域发展现状的基础上,深入分析区块链技术在国际贸易支付应用中存在的问题,最后提出应用对策。

【关键词】区块链技术;;国际贸易;;支付

【文献类型】

【DOI】 10.19463/j.cnki.sdjm.2023.05.015

【发表时间】2023-06-11

数字经济时代金融科技服务实体经济高质量发展研究进展与展望

【作者】 周雷;许佳;菲努拉·艾尼瓦尔;

【作者单位】苏州市职业大学商学院;东南大学经济管理学院;

【文献来源】金融理论探索

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】党的二十大明确了促进数字经济和实体经济深度融合,着力推动高质量发展的目标任务。服务实体经济是金融科技创新的出发点和落脚点。通过系统梳理相关前沿研究进展发现:数字经济、金融科技与实体经济的内在联系为金融科技服务实体经济研究提供了学理支撑。金融科技通过运用数字技术,促进供需匹配、降低融资成本、发展普惠金融,进而增强金融服务实体经济的能力。实证研究表明,金融科技创新有助于提升实体经济高质量发展水平。小微企业融资、乡村振兴和产业数字化是金融科技服务实体经济的重点领域。但是,金融科技缺乏有效监管也会影响实体经济和金融稳定,因此要完善监管体系,构建创新生态,以服务实体经济为目的推进金融数字化转型,实现守正创新。针对已有研究的不足,从夯实基础、深化内容、改进方法、创新视角等方面提出具体建议。展望未来,“元宇宙”为数字经济时代金融科技服务实体经济提供了全新“场域”,要加大理论研究与技术创新力度,探索构建“金融元宇宙”,全方位服务实体经济高质量发展。

【关键词】金融科技;;实体经济;;高质量发展;;数字经济;;数字金融;;元宇宙

【文献类型】

【DOI】 10.16620/j.cnki.jrjy.2023.03.007

【发表时间】2023-06-11

基于区块链技术的去中心化互联网号码资源管理系统

【作者】 李江;徐明伟;曹家浩;孟子立;张国强;

【作者单位】清华大学计算机科学与技术系;清华大学网络科学与网络空间研究院;

【文献来源】清华大学学报(自然科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】作为互联网唯一的域间路由协议,边界网关协议(border gateway protocol,BGP)当前面临着互联网号码资源误用的威胁。现有安全方案——资源公钥基础设施(resource public key infrastructure,RPKI)通过中心化的基础设施维护互联网号码资源信息,然而该方案面临着中心化导致的单点失效风险、收敛时间长和开销高的问题。该文提出了基于区块链技术的去中心化互联网号码资源管理系统(decentralized internet number resource management system,DINRMS)。为提高系统的可扩展性,在结构上对全球自治系统(autonomous system,AS)分组分层,并针对此结构设计了相应的工作流程。此外,基于上述分组分层结构提出了一种基于互联网号码资源所有权信息和映射信息产生情况的启发式数据推送机制,缩短AS获得这些信息的收敛时间,同时减少交互开销。实验表明,DINRMS为域间路由提供了安全可信的互联网号码资源信息;相比RPKI,DINRMS的中心化程度降低了60%以上,收敛时间缩短了50%以上,交互开销减少了50%以上。

【关键词】边界网关协议;;互联网号码资源;;域间路由安全

【文献类型】

【DOI】 10.16511/j.cnki.qhdxxb.2023.21.016

【发表时间】2023-06-11

基于区块链的轻量级物联网医疗数据访问控制方案

【作者】 李嘉豪;李冬梅;张晓梅;

【作者单位】上海工程技术大学电子电气工程学院;上海市信息安全综合管理技术研究重点实验室;

【文献来源】重庆邮电大学学报(自然科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】基于物联网的智慧医疗系统,给患者和医务工作者带了极大的便利,但是物联网医疗设备产生的海量医疗数据包含着患者的个人隐私,一旦泄露会造成重大损失,以往的访问控制方案存在不灵活,中心化,加密效率较低等问题。针对这些问题,提出了一种基于区块链的轻量级物联网医疗数据访问控制方案。提出了一种改进的多中心属性基加密(multi-authority attribute-based encryption,MA-ABE)方案为患者提供细粒度的安全数据共享,并且利用IPFS技术存储患者数据。结合雾计算技术,利用雾节点承担属性基加解密过程中大部分的计算开销,减轻用物联网设备负担。进行安全性分析和仿真实验,结果表明,提出的方案在保证安全的情况下为物联网医疗数据提供了高效并且轻量级的访问控制。

【关键词】多中心属性基加密(MA-ABE);;雾计算;;区块链;;访问控制;;智慧医疗

【文献类型】

【DOI】

【发表时间】2023-06-11

数字时代刑事电子数据鉴真的模式选择

【作者】 李戈;

【作者单位】山东大学法学院;

【文献来源】济南大学学报(社会科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

--

【摘要】在数字时代,电子数据在诉讼程序中具有越来越重要的作用。鉴真作为证据可采性的前提,具有保障电子数据真实性的重要价值。电子数据鉴真主要存在两种模式:外部鉴真模式和自我鉴真模式。外部鉴真模式具有导致诉讼成本过高的明显缺陷,自我鉴真模式则无此问题,并且区块链技术的日益成熟为电子数据自我鉴真模式提供了技术支持。当前,我国刑事电子数据鉴真规则缺乏体系化设置,外部鉴真规则零散不成体系,自我鉴真规则相对缺失。为了保障电子数据在刑事诉讼中的可采性,我国应当细化现有外部鉴真规则,增加自我鉴真规则,从而完善刑事电子数据鉴真体系。

【关键词】电子数据;;鉴真;;保管链条;;真实性;;区块链

【文献类型】

【DOI】 10.20004/j.cnki.ujn.2023.03.015

【发表时间】2023-06-11

在线标注

备案号: 苏ICP备17025947号-5

评论回复