• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2025年02月07日 90篇

文献来源

  • 90

主题分类

      • 90

文献类型

  • 90
筛选
订阅
<< 前一天 后一天 >>

Trust at Scale: The Economic Limits of Cryptocurrencies and Blockchains*

【Author】 Budish, Eric

FT50

【影响因子】19.013

【主题类别】

--

【Abstract】Satoshi Nakamoto (2008) invented a new kind of economic system that does not need the support of government or rule of law. Trust and security instead arise from a combination of cryptography and economic incentives, all in a completely anonymous and decentralized system. This article shows that Nakamoto's novel form of trust, while undeniably ingenious, is deeply economically limited. The core argument is three equations. A zero-profit condition on the quantity of honest blockchain "trust support" (work, stake, etc.) and an incentive-compatibility condition on the system's security against majority attack (the Achilles heel of all forms of permissionless consensus) together imply an equilibrium constraint, which says that the "flow" cost of blockchain trust has to be large at all times relative to the benefits of attacking the system. This is extremely expensive relative to traditional forms of trust and scales linearly with the value of attack. In scenarios that represent Nakamoto trust becoming a more significant part of the global financial system, the cost of trust would exceed global GDP. Nakamoto trust would become more attractive if an attacker lost the stock value of their capital in addition to paying the flow cost of attack, but this requires either collapse of the system (hardly reassuring) or external support from rule of law. The key difference between Nakamoto trust and traditional trust grounded in rule of law and complementary sources, such as reputations, relationships, and collateral, is economies of scale: society or a firm pays a fixed cost to enjoy trust over a large quantity of economic activity at low or zero marginal cost.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1093/qje/qjae033

Blockchain-Enabled Distributed Authentication Mechanism for Industrial Device Access

【Author】 Hu, Junjie Sun, Danfeng Lu, Wei Dong, Junwei Wu, Huifeng

CCF-C

【影响因子】11.648

【主题类别】

--

【Abstract】The secure access of numerous heterogeneous devices ensures the stability of the industrial Internet of Things. Centralized authentication can be overwhelmed by an influx of authentication requests from malicious devices. Distributed device-to-device authentication is vulnerable to tampering attack evidence. Blockchain authentication eases evidence tampering, but traditional blockchains impose high-performance requirements on devices, rendering them unsuitable for resource-limited devices. Therefore, in this article, we apply IOTA to device access authentication. To the best of authors' knowledge, this is the first application. Based on this, we propose a blockchain-enabled distributed authentication mechanism for industrial device access. The authentication involves a consensus phase based on optimized IOTA and a unique identification code validation phase. We optimized the tip selection algorithm of IOTA to make it faster and more stable. The performance experiment results demonstrate that our mechanism meets the time-consuming requirements of device access. The security experiments indicate that the authentication phases effectively intercept the attacks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Industrial Internet of Things; Blockchains; Protocols; Security; Servers; Real-time systems; Informatics; Systems architecture; Physical unclonable function; Blockchain; device access; industrial Internet of Things (IIoT); lightweight distributed authentication

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TII.2024.3507201

Comparative techno-economic analysis of market models for peer-to-peer energy trading on a distributed platform

【Author】 Galici, Marco Troncia, Matteo Nour, Morsy Chaves-Avila, Jose Pablo Pilo, Fabrizio

【影响因子】11.446

【主题类别】

--

【Abstract】Since the emergence of distributed energy resources, local electricity markets have garnered interest for energy sharing on a community scale through both centralized and distributed models, including innovative distributed platforms. Numerous studies and initiatives have demonstrated that local markets and peer-to-peer transactions can be effective for electricity networks under specific conditions. Amidst the growing exploration of local market models, there is a noticeable gap in quantitative techno-economic analyses comparing different auction mechanisms. This paper aims at filling this gap by representing a comparative analysis of the most commonly implemented double-sided market models for peer-to-peer transactions based on a distributed ledger implementation. The comparison is based on quantitative key performance indicators designed to assess the economic and technical performance of these market models, including technical constraints within the power system through a network constraints management market. According to the selected metrics, the simulation results reveal that no single model outperforms all others. The authors conclude that, under the tested application and assumed conditions, the distributed market using distributed ledger technology faces several challenges that hinder its efficient application to local energy trading.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Peer-to-peer energy trading; Local electricity markets; Techno-economic analysis; Double auction models comparison

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.apenergy.2024.125005

Practical Blockchain-Based Options Contract

【Author】 Zhang, Zhao Xu, Chunxiang Jiang, Changsong

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】Decentralized finance (DeFi) relies on crypto assets in blockchains to provide financial services. High volatility of crypto assets puts users at risk of financial loss. Options contracts address this issue by empowering a buyer to exchange his asset with that of a seller, which mitigates risks for both parties. Existing options contract protocols have the following two weaknesses: (i) The buyer have to lock his asset during the contract's lifespan, incurring heavy opportunity costs; (ii) Turing-completed smart contract (TCSC)/hash time lock contract (HTLC) is required to exchange assets, which restricts applicability as TCSC/HTLC is supported by a limited number of blockchains. In this paper, we propose UP-BLOC, a universal and practical blockchain-based options contract. We construct UP-BLOC using a buyer-pay-first design, and propose a blockchain-based secret storage mechanism to ensure the security of the assets involved. This allows the buyer to engage in an options contract without locking any asset and resulting opportunity costs, and thus is more practical than existing works. Besides, UP-BLOC achieves the exchange of assets using standard digital signatures instead of TCSC/HTLC. Hence, UP-BLOC is compatible with all blockchains and is universal. Security analysis and performance evaluation demonstrate that UP-BLOC is secure and efficient.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Options contract; Blockchains; adaptor signatures; secret sharing; Options contract; blockchains; adaptor signatures; secret sharing

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3404372

Cloak: Hiding Retrieval Information in Blockchain Systems via Distributed Query Requests

【Author】 Xiao, Jiang Chang, Jian Lin, Licheng Li, Binhong Dai, Xiaohai Xiong, Zehui Choo, Kim-Kwang Raymond Gai, Keke Jin, Hai

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】The privacy-preserving query is critical for modern blockchain systems, especially when supporting many crucial applications such as finance and healthcare. Recent advances in blockchain query schemes mainly focus on enhancing the traceability efficiency of integrity authentication. Despite these efforts, we argue that the exposure of retrieval information may result in privacy leakage, which inevitably poses an important yet unresolved challenge. In this paper, we introduce Cloak, a novel privacy-preserving blockchain query scheme with two notable features. First, it utilizes a two-phase distributed query requests technique, i.e., division and aggregation, to hide retrieval information based on the natural independent characteristic of blockchain. Second, we add noise to the sub-request set to avoid malicious attacks during transmission and adopt smart contract-based asymmetric encryption to guarantee the correctness of query results. Experimental results demonstrate that Cloak improves the query performance by up to 4x and reduces the storage overhead by 50% compared with the state-of-the-art Spiral.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Privacy; Data privacy; Query processing; Protection; Encryption; Noise; Blockchain; privacy-preserving; distributed query; lightweight client

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3411450

Resource Allocation in Blockchain Integration of UAV-Enabled MEC Networks: A Stackelberg Differential Game Approach

【Author】 Wang, Die Jia, Yunjian Liang, Liang Ota, Kaoru Dong, Mianxiong

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】Recently, unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) has emerged as a practical paradigm to enable low latency computing offloading for dispersed users in the fifth generation (5G) wireless networks. However, severe security and privacy concerns are associated with the open environment between the UAVs and edge computing nodes. In this paper, we address these challenges by integrating blockchain technology into UAV-enabled MEC networks. We present an innovative Delegated Proof of Stake (DPoS) consensus mechanism where the UAV is a primary node and verification nodes are edge computing nodes selected by the reputation mechanism. To enhance mobile users' Quality of Service (QoS), edge computing resources need to be allocated among UAV and verification nodes. Based on this, we propose the trading mechanism for resource pricing and allocation based on the two-stage Stackelberg differential game. Meanwhile, dynamic states of user demands and verification node reputations are modeled using differential equations as constraints of the objective function at various stages to simulate adaptive service requests for users and incentivize active participation for verification nodes. Simulation results prove the effectiveness of the proposed resource trading scheme and demonstrate the equilibrium and convergence status of resource pricing and allocation for edge computing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Autonomous aerial vehicles; Resource management; Security; Pricing; Computational modeling; Wireless communication; Blockchain; mobile edge computing (MEC); unmanned aerial vehicle (UAV); resource pricing; resource allocation; stackelberg differential game

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3418330

VRCCS-AC: Reinforcement Learning for Service Migration in Vehicular Edge Computing Systems

【Author】 Gao, Zhen Yang, Lei Dai, Yu

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】Existing service migration approaches provide minimal service delay for mobile vehicles (MVs) in vehicular edge computing (VEC) systems. Nonetheless, existing approaches focus more on formulating migration strategies rely on global information of the system, which may incur high signaling overhead and poor scalability. Furthermore, existing approaches are difficult to reuse previous migration strategies and necessitate significant interaction to adapt to new VEC scenarios. In this paper, we present a decentralized service migration approache base on Variational Recurrent and Critic-Coached Strategy reuse Actor-Critic (VRCCS-AC). First, a variational recurrent model (VRM) is introduced to efficiently obtain information from MV's local state through modeling VEC scenarios. An actor-critic enhances migration strategies by accessing both VEC scenario and VRM. Second, CCS leverages the critic-network to assess and select source service migration strategy. In every state, CCS selects the source strategy that exhibits the most significant one-step enhancement compared to the current target strategy, and develops a coached strategy. Then, the target strategy is regularized to imitate the coached strategy to facilitate effective strategy search and efficient strategy transfer. Experiments on the real-world datasets demonstrate that compared to the baselines, VRCCS-AC reduces latency by 10.11%similar to 18.57% and can quickly transfer to new VEC scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Task analysis; Heuristic algorithms; Computational modeling; Training; Optimization; Delays; Vehicle dynamics; Vehicular edge computing (VEC); service migration; reinforcement learning (RL); variational recurrent model (VRM); transfer learning

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3407581

ZKWASM: A ZKSNARK WASM Emulator

【Author】 Gao, Sinka Li, Guoqiang Fu, Hongfei

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】WebAssembly, or WASM for short, is a binary code format for a stack-based virtual machine, first published in 2018 and now becomes a main-steam technology for providing distributed serverless functions. Recently, the demand for privacy and trustless serverless functions has started to grow in cloud, edge, and grid computing, which poses a question for those serverless function providers: how they ensure trustworthy computation in safety-critical scenarios like financial systems, cybersecurity, private data handling, etc. To address this, we leverage the technology ZKSNARK (zero-knowledge Succinct Non-interactive Argument of Knowledge), a powerful proof system that allows efficient verification of the evaluation problem of statements, to give WASM runtime the ability to provide trustless computation service. More precisely, we present ZKWASM, a ZKSNARK backed virtual machine that emulates the execution of WASM bytecode and generates zero-knowledge-proofs for the emulation result. The proof generated by the ZKWASM virtual machine can then be used to convince an entity, with no leakage of confidential information, that the result of the emulation enforces the semantic specification of WASM.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Virtual machining; Circuits; Cloud computing; Privacy; Polynomials; Codes; Blockchains; WebAssembly; ZKSNARK; virtual machine; privacy

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3422798

A Survey on Security Analysis Methods of Smart Contracts

【Author】 Zhu, Huijuan Yang, Lei Wang, Liangmin Sheng, Victor S.

CCF-A

【影响因子】11.019

【主题类别】

--

【Abstract】Smart contracts have gained extensive adoption across diverse industries, including finance, supply chain, and the Internet of Things. Nevertheless, the surge in security incidents of smart contracts over recent years has led to substantial economic losses. Therefore, ensuring the security of smart contracts has become a critical and complex challenge in both academic and industrial domains. Based on 539 real-world security incidents in the Ethereum platform and audit reports from 10 authoritative auditing institutions, we summarize 27 types of exploited security vulnerabilities and draw insights into their principles, typical cases, relevant research and recommended prevention strategies. Besides, we also gather 7 other potentially threatening vulnerability types as supplements. On this basis, we conduct an in-depth analysis of the root causes of vulnerabilities and further formulate eight safety practical rules. Moreover, we perform a comprehensive review of 178 recent papers on smart contract security analysis, classifying detection methods into formal verification, fuzz testing, machine learning, program analysis, and others. For each category, we seize the specific detection tools and analyze them comprehensively. Then, we conduct an extensive analysis and synthesis from various angles, presenting a comprehensive overview of the current research landscape in smart contract security detection. We also discuss current on-chain and off-chain repair methods. Finally, this review outlines major challenges and highlights potential areas for future research in this field.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; Security; Blockchains; Open source software; Cryptocurrency; Prevention and mitigation; Reviews; blockchain; ethereum; security analysis; vulnerabilities

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TSC.2024.3463394

Beyond and beneath the Metaverse dazzle: The interplay of VR and blockchain-based social exchanges and affordances in determining NFT trading user experience

【Author】 Basu, Bibaswan Mandal, Subhadeep Kar, Arpan Kumar

【影响因子】10.972

【主题类别】

--

【Abstract】This research attempts to theoretically establish the factors influencing experiences of users when trading nonfungible tokens (NFT) facilitated by blockchain technology in the metaverse, a place where users conduct reallife activities in a virtual environment. Based on over 204 thousand user reviews obtained from 15 metaverse platforms, themes influencing users' experiences were identified through natural language processing. Upon mapping these themes through the lens of social exchange theory and value affordance theory, the final set of factors influencing user experience were established and their relevance examined through multiple regression models. We found that interactivity, visibility, verification, value creation, transparency, and efficiency significantly influenced experience of a user in the NFT buying/selling process in the metaverse, whereas decentralized self-reliance, identity protection and token preference were found to be less influential while determining the same. The findings can be used by organizations developing metaverses to enhance the virtual experience of users, adding value to their business.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Metaverse; NFT; Blockchain; User experience; Social exchange theory; Value affordance theory; Text mining; Big data analytics

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.jretconser.2024.104180

The Quantum Leap Toward a Sustainable Future: Exploring the Nexus Between Blockchain, Circular Economy, and Managerial Perceptions

【Author】 Dalvi-Esfahani, Mohammad Azar, Nasrin Leong, Lam Wai Ramayah, T. Sarker, Moniruzzaman

【影响因子】10.801

【主题类别】

--

【Abstract】The planetary ecosystem currently confronts a myriad of dire environmental predicaments, necessitating immediate and decisive action to forestall irreversible damage wrought by economic activities. Embracing the tenets of circular economy (CE) presents a compelling and exigent opportunity to attenuate wastage and engender resource recycling. In this milieu, blockchain technology (BCT) emerges as a pivotal instrumentality in imbricating CE principles into the tapestry of environmentally conscientious supply chain practices. However, the enigmatic nature of the factors that undergird the seamless integration of BCT into CE practices bespeaks a pressing need for further elucidation. This inquiry endeavors to scrutinize executives' perspectives regarding adopting BCT as a fulcrum for CE and its multifaceted impact on organizational performance. A research model predicated on the belief-action-outcome (BAO) framework was conceptualized and scrutinized utilizing partial least squares structural equation modeling (PLS-SEM) with data gleaned from 164 responses from Malaysian manufacturing firms. The findings evince that respondents' attitudes were significantly swayed by the organizational CE culture, their cognitive grasp of BCT principles, and their normative inclinations. Furthermore, the investigation unearthed that personal norms and attitudes wielded a palpable influence on the inclination to adopt BCT to catalyze CE, thereby exerting a substantive impact on the organization's economic and environmental performance. A roadmap delineating a trajectory to further facilitate BCT-propelled CE is proffered.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】belief-action-outcome; blockchain technology; circular economy; sustainable supply chain

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1002/bse.4112

Verifiable Strong Privacy-Preserving Any-Hop Reachability Query on Blockchain-Assisted Cloud

【Author】 Yu, Jingjuan Duan, Yuwei Luo, Ping Li, Shundong

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Any-hop ( k-hop) reachability query is one fundamental operation in graph data analysis and its performance affects the efficiency of various tasks in Social Internet of Things. As graph data scale increases, data is often outsourced to cloud servers. To protect the privacy of graph data, it is necessary to encrypt the data before outsourcing. Existing schemes can only support privacy-preserving 2-hop reachability queries. Only one scheme can support privacy-preserving k-hop reachability queries, but it discloses topological information and the query results is not verifiable. Most serious deficiency is that its efficiency is not practical. To address these issues, we propose a verifiable strong privacy-preserving k-hop reachability query on encrypted data. This scheme not only supports efficient privacy-preserving k-hop reachability queries without leaking any network topological information but also uses blockchain to achieve verifiability of query results. The security analysis shows that our scheme is secure. Compared to existing k-hop reachability query scheme, our scheme greatly improves query efficiency (at least 6.4 10(5)x faster when the number of nodes n >= 100).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain (BC); verifiable; verifiable; verifiable; k-hop reachability privacy-preserving; k-hop reachability privacy-preserving; k-hop reachability privacy-preserving; k-hop reachability privacy-preserving; k-hop reachability privacy-preserving; verifiable

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/JIOT.2024.3445431

A Blockchain-Assisted Multifactor Authentication Protocol for Enhancing IoMT Security

【Author】 Pradhan, Manabhanjan Mohanty, Sujata

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】This article presents a novel approach to enhancing the Internet of Medical Things (IoMT) security. A blockchain-based multifactor authentication protocol is designed to address significant security challenges of all the existing IoMT applications. To address security issues, such as preserving patient data privacy and vulnerable or compromised medical devices, we introduced a model in which IoMT devices communicate securely with less time and low-energy consumption. The formal verification of the proposed scheme is rigorously done by using two popular tools, ProVerif and BAN logic, and our model can resist the exploitation of vulnerabilities, thereby preventing the launching of attacks. Gas costs for registration and authentication are 600115 and 253517, respectively. Furthermore, using Slither tool we finds no vulnerabilities in the smart contract using 95 detectors. The proposed approach's computation and communication overheads are compared with some existing competent schemes, and it is found that IoMT devices based on our model take less time for computation and communication. Moreover, the proposed scheme is based on elliptic curve cryptography and consumes less energy. Thereby suitable for working in a resource-constrained environment. The security analysis of the proposed scheme shows that it can withstand many passive and active attacks. Hence, the proposed approach can be applicable to healthcare applications with trust and reliability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Security; Biometrics (access control); Blockchains; Elliptic curve cryptography; Protocols; Cryptography; biometrics; blockchain; Internet of Medical Things (IoMT)

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/JIOT.2024.3422242

On Phishing URL Detection Using Feature Extension

【Author】 He, Daojing Liu, Zhihua Lv, Xin Chan, Sammy Guizani, Mohsen

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Phishing is a common cybercrime event with great harm. Various phishing attacks have occurred repeatedly and have caused huge economic losses. With the booming development of blockchain and cryptocurrency, the huge amount of money in the field and the immature ecosystem have induced phishing attacks to flood the field in large quantities. Unfortunately, phishing has become the main means of attack in the field, posing a huge security threat to users' digital assets. The existing methods for detecting phishing websites rely on the quality of uniform resource locator (URL) feature extraction, and the extraction angle is becoming increasingly rigid. Therefore, this article proposes a phishing URL detection model that utilizes feature extension. This method uses the TextRank algorithm to generate a feature extension library and embeds the extracted features into the URL to be detected. After the URL is vectorized, it is input into the two-layer classification network proposed in this article to classify the website. This classifier consists of an upstream task Bert layer and a downstream task convolutional neural network layer. It is possible to simultaneously learn the comprehensive representation information and local feature information of URLs, effectively avoiding overfitting problems and improving the ability to identify phishing websites. Comparative experiments are conducted using a data set of real phishing websites. The experimental results show that this model has higher accuracy and stability compared to other phishing website detection models.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Phishing; Feature extraction; Uniform resource locators; Blocklists; Accesslists; Machine learning algorithms; Deep learning; Blockchain; deep learning; feature extension; phishing detection

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/JIOT.2024.3446894

Profit or prestige? Strategies for luxury brands to navigate the second-hand market using blockchain technology

【Author】 Varshney, Umang Karamchandani, Amit Kundu, Tanmoy Kapoor, Rohit

【影响因子】10.047

【主题类别】

--

【Abstract】Luxury brands are increasingly adopting blockchain technology to combat counterfeiting, yet they face a dilemma in addressing the market of second-hand luxury products. While a luxury brand's involvement in second-hand sales could diminish its exclusivity, it could also increase the brand's profits. Motivated by luxury brands' concerns about venturing into the second-hand market while preserving their brand exclusivity, this study presents an analytical model to investigate how blockchain authentication impacts their strategies in the second-hand market. A distinctive feature of this study is the conceptualisation of aspirational value associated with the luxury brand. Our analysis reveals that premium and mass-market brands can improve brand exclusivity by enhancing second-hand product quality. However, luxury brands may diminish brand exclusivity if the quality of second-hand products is high. Additionally, luxury brands can maintain exclusivity by avoiding the second-hand market when using blockchain for authentication, provided that the authentication cost is below a threshold. Furthermore, our research sheds light on the strategies of various fashion brands (mass-market, premium, and luxury brands), contingent upon their aspirational values, to combat counterfeit products by deploying a blockchain-based authentication mechanism for the second-hand market.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Retail operations; Blockchain; Luxury brand; Second-hand market; Counterfeits; Game theory

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.tre.2024.103726

Blockchain technology as a driver for sustainability? A consumer purchase intention perspective

【Author】 Huang, Bo Dai, Jing Lim, Jia Jia

【影响因子】9.360

【主题类别】

--

【Abstract】PurposeBlockchain-based traceability labels is increasingly adopted in supply chain, yet there is little empirical research to examine effectiveness from consumer perspective. Can blockchain technology motivate consumers to purchase sustainable products? Drawing on signaling theory, this paper answers this question by comparing the effect of blockchain-based traceability labels with certification-based labels on consumer purchase intention of sustainable products. We further investigate consumers' perception of sustainability level as a mediating variable and social enterprise as a boundary condition.Design/methodology/approachThis study uses three online between-subject experiments with a total of 750 participants. The proposed hypotheses are tested using analysis of covariance (ANCOVA) as well as mediation analysis based on PROCESS macro.FindingsThe results suggest that (1) blockchain-based traceability labels lead to greater consumer purchase intention of sustainable products than certification-based labels; (2) such a positive effect of blockchain-based traceability labels occurs as consumers perceive a higher sustainability level; (3) however, the effect is attenuated when the company is a social enterprise.Originality/valueThis study contributes to the operations and supply chain management (OSCM) literature by studying the effectiveness of blockchain-based traceability labels from the overlooked yet emerging perspective of consumers. We provide a theoretical explanation and empirical evidence of how blockchain-based traceability labels influence consumer purchase intention during sustainable consumption compared with certification-based labels. We thus additionally contribute to the extant research on the intersection of blockchain and sustainability. Moreover, the incorporation of social enterprise as a moderator enriches the application of signaling theory on the context of sustainability signaling.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Experiment; Consumers; Signaling theory; Sustainability; Social enterprise

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1108/IJOPM-04-2024-0340

Blockchain technology for building buyer-supplier trust and transparency in supply chains: An experimental study on P2P online marketplace vendors

【Author】 Caliskan, Ferhat Idug, Yavuz Gligor, David Hong, Seock-Jin

【影响因子】8.890

【主题类别】

--

【Abstract】This study aims to examine blockchain technology's impact on transparency and trust within the context of the buyer-supplier relationship of vendors and P2P (peer-to-peer) platforms. This research employs a scenario-based experimental design and an online dataset comprised of 243 vendors on an online P2P platform to empirically test the effect of blockchain features. The findings indicate that the relationship between blockchain features and the vendors' willingness to continue selling is fully mediated by the vendors' perceptions of transparency of the P2P platform and their trust in it. Moreover, switching costs moderate the relationship between trust and willingness to continue selling on the P2P platform, but not the one between transparency and willingness. Unlike the previous research, this study examines the relationship with online platforms from the perspective of vendors (B2B), rather than end customers (B2C). This research contributes to social exchange theory and resource dependence theory, as well as to the emerging research at the intersection of business relationships in P2P online platforms, microenterprises, and emergent technologies. Further, we augment supply chain literature on buyer-supplier trust by offering insights into the impact of blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Peer-to-peer platform; Blockchain; Buyer-supplier relationship; Trust; Transparency; Switching cost; Social exchange theory; Resource dependence theory

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.indmarman.2024.12.004

Tokenizing Innovation: A Blockchain-Based Innovation System as a Step Toward Achieving Sustainable Development

【Author】 Xie, Xin Alnafrah, Ibrahim Dagestani, Abd Alwahed

【影响因子】8.562

【主题类别】

--

【Abstract】This study examines patenting patterns to identify inefficiencies in innovation systems and proposes a blockchain-based solution to advance sustainable development goals (SDGs) 4, 8, 9, and 17. Using a dataset of 13,910 patent documents, the research employs a multi-step methodology: a patent landscape analysis, network analysis, and structural equation modeling (SEM). Our findings indicate that patents linked to non-competitive technologies and low originality scores are more likely to become inactive. Furthermore, the study identifies several factors contributing to the low efficiency of the innovation system, including closed technology transfer processes and weak collaborative synergies among stakeholders. To address these challenges, a blockchain-based rewards system is proposed to foster beneficial relationships among innovation stakeholders, supporting sustainable innovation practices. This study enhances our understanding of innovation theory and provides insights for policymakers, linking the proposed solution to achieving SDGs 4, 8, 9, and 17 through sustainable innovation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; innovation system failure; intellectual property rights; national innovation system; SDGs; tokenization

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1002/sd.3325

A hybrid ensemble model to detect Bitcoin fraudulent transactions

【Author】 Zhang, Lifang Xuan, Ye Liu, Zhenkun Du, Zhiyuan Wang, Shuai Wang, Jianzhou

CCF-C

【影响因子】7.802

【主题类别】

--

【Abstract】Fraudulent transactions in the Bitcoin ecosystem wield substantial influence over both the economy and the level of trust within a blockchain network. The identification of fraudulent transactions is a crucial task within the financial system. However, existing detection methods predominantly rely on either an individual model or a single bagging or boosting ensemble model, leading to inadequate prediction accuracy and limited interpretability. To address this limitation, a hybrid ensemble model that integrates bagging (random forest (RF)) and boosting (categorical boosting (CatBoost)) is proposed, in which strong classifiers -CatBoost is used to replace the weak classifiers in RF, thus effectively improving the prediction performance. Empirical findings demonstrate the proposed hybrid ensemble framework can consistently yields the highest accuracy. Furthermore, we introduce extreme gradient boosting as a surrogate model that can obtain more accurate relations between actual labels and the predictions, compensating for the challenges of understanding complex models. Then, the visualization package based on Shapley additive explanations (SHAP) value is adopted for the interpretability analysis on the surrogate model, which contributes to the field of fraud detection by revealing the potential influencing factors behind the predicted results and providing unique insights into how fraud detection behavior can be detected.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin fraud detection; Hybrid ensemble model; Interpretability analysis

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.engappai.2024.109810

BAIoT-EMS: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things

【Author】 Khan, Abdullah Ayub Yang, Jing Laghari, Asif Ali Baqasah, Abdullah M. Alroobaea, Roobaea Ku, Chin Soon Alizadehsani, Roohallah Acharya, U. Rajendra Por, Lip Yee

CCF-C

【影响因子】7.802

【主题类别】

--

【Abstract】The rapid adoption of Augmented Intelligence of Things (AIoT) in enterprise management (EM) presents significant challenges in securely managing and exchanging information. This study introduces a blockchain-based platform, BAIoT-EMS, designed to enhance security and efficiency in AIoT-enabled EM systems. The platform leverages a consortium network and InterPlanetary File Storage (IPFS) for secure storage and transaction management, supported by smart contracts to automate and safeguard processes like device registration. A novel multi-proof-of-work consensus mechanism is implemented to analyze, validate, and verify AIoT transactions while minimizing resource consumption. Simulation results demonstrate a 63.51% improvement in performance and an 11.75% reduction in computational power usage, highlighting the effectiveness of the proposed framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Internet of things (IoT); Augmented intelligence of things (AIoT); Smart contract; Enterprise management system (EMS)

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.engappai.2024.109838

PSPL: A Ponzi scheme smart contracts detection approach via compressed sensing oversampling-based peephole LSTM

【Author】 Wang, Lei Cheng, Hao Sun, Zihao Tian, Aolin Yang, Zhonglian

【影响因子】7.307

【主题类别】

--

【Abstract】Decentralized Finance (DeFi) utilizes the key principles of blockchain to improve the traditional finance system with greater freedom in trade. However, due to the absence of access restrictions in the implementation of decentralized finance protocols, effective regulatory measures are crucial to ensuring the healthy development of DeFi ecosystems. Asa prominent DeFi platform, Ethereum has witnessed an increase in fraudulent activities, with the Ponzi schemes causing significant user losses. With the growing sophistication of Ponzi scheme fraud methods, existing detection techniques fail to effectively identify Ponzi schemes timely. To mitigate the risk of investor deception, we propose PSPL, a compressed sensing oversampling-based Peephole LSTM approach for detecting Ethereum Ponzi schemes. First, we identify Ethereum representative Ponzi schemes' features by analyzing smart contracts' codes and user accounts' temporal transaction information based on the popular XBlock dataset. Second, to address the class imbalance and few-shot learning challenges, we leverage the compressed sensing approach to oversample the Ponzi Scheme samples. Third, peephole LSTM is employed to effectively capture long sequence variations in the fraud features of Ponzi schemes, accurately identifying hidden Ponzi schemes during the transaction process incase fraudulent features are exposed. Finally, experimental results demonstrate the effectiveness and efficiency of PSPL.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Compressed sensing; Ethereum; Peephole LSTM; Ponzi scheme detection; Smart contract

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.future.2024.107655

Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction

【Author】 Li, Rujia Wang, Qin Li, Yuanzhao Duan, Sisi Wang, Qi Galindo, David

CCF-A

【影响因子】7.231

【主题类别】

--

【Abstract】Trusted Execution Environment (TEE)-assisted confidential smart contracts (TCSC) have attracted extensive attention from both academia and industry. Despite an enormous number of TCSC projects, the extent of confidentiality offered by them remains being questioned: the factual and fictional aspects are not well distinguished, which limits their adoption. In this paper, we provide a formal treatment of TCSC, endowing them with an expressive syntax and security definitions. Based on these definitions, we propose a provably secure TCSC instantiation. Then, we investigate each algorithm and identify the implementation flaws that may make a TCSC system violate its security properties. Our analysis reveals the gap between theoretical security models and real-world implementations: even assuming a TCSC is provably secure by design, it may still fail in practice. We further compare our TCSC instantiation with 16 representative TCSC systems. Our results show that, surprisingly, all these surveyed projects are subject to practical attacks. Finally, we implement a TCSC prototype and conduct a comprehensive evaluation, revealing the overheads of distributed key management and the performance challenges of executing complex contracts within TEEs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Thyristors; Power capacitors; Blockchains; Smart contracts; Privacy; Prototypes; Load modeling; Buildings; Hardware; Decentralized applications; Blockchain; TEE; confidential smart contract

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TIFS.2024.3484291

Byzantine Fault Tolerance With Non-Determinism, Revisited

【Author】 Huang, Yue Li, Huizhong Sun, Yi Duan, Sisi

CCF-A

【影响因子】7.231

【主题类别】

--

【Abstract】Conventional Byzantine fault tolerance (BFT) requires replicated state machines to execute deterministic operations only. In practice, numerous applications and scenarios, especially in the era of blockchains, contain various sources of non-determinism. Meanwhile, it is even sometimes desirable to support non-determinism, and replicas still agree on the execution results. Despite decades of research on BFT, we still lack an efficient and easy-to-deploy solution for BFT with non-determinism-BFT-ND, especially in the asynchronous setting. We revisit the problem of BFT-ND and provide a formal and asynchronous treatment of BFT-ND. In particular, we design and implement Block-ND that insightfully separates the task of agreeing on the order of transactions from the task of agreement on the state: Block-ND allows reusing existing BFT implementations; on top of BFT, we reduce the agreement on the state to multivalued Byzantine agreement (MBA), a somewhat neglected primitive by practical systems. Block-ND is completely asynchronous as long as the underlying BFT is asynchronous. We provide a new MBA construction that is significantly faster than existing MBA constructions. We instantiate Block-ND in both the partially synchronous setting (with PBFT, OSDI 1999) and the purely asynchronous setting (with PACE, CCS 2022). Via a 91-instance WAN deployment on Amazon EC2, we show that Block-ND has only marginal performance degradation compared to conventional BFT.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Blockchains; Systems architecture; Fault tolerant systems; Fault tolerance; Fabrics; Computer languages; Codes; Sun; Probabilistic logic; BFT; non-determinism; MBA

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TIFS.2024.3516541

Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing

【Author】 Duan, Pengfei Ma, Zhaofeng Gao, Hongmin Tian, Tian Zhang, Yuqing

CCF-A

【影响因子】7.231

【主题类别】

--

【Abstract】To achieve fine-grained access control and address the data silos challenge in data sharing, the integration of blockchain with attribute-based encryption emerges as a promising solution. Nowadays, the growing interconnectedness among diverse blockchain applications has spurred the need for efficient cross-chain data sharing. However, existing single-authority attribute-based data sharing schemes are not suitable for such cross-chain scenarios involving multiple attribute authorities. Moreover, the frequent requirement for data owners to process cross-chain data requests significantly hampers practicality. In this context, we introduce a novel multi-authority attribute-based proxy re-encryption scheme that enables ciphertext policy updating and supports secure and efficient cross-chain data sharing. By introducing a proxy, the data owner is empowered to delegate access without leaking any valid information and flexibly sells data across blockchains through cross-chain access policies. Besides, our scheme leverages the relay chain to foster a decentralized and trustworthy ecosystem. The adoption of smart contracts automates the cross-chain data sharing process and ensures equitable distribution of benefits among participants. Additionally, our scheme integrates hybrid encryption with the decentralized data hosting platform, substantially mitigating the on-chain storage burden. Security analysis affirms that our scheme is semantically secure and resistant to collusion attack. Performance analysis and simulation experiments demonstrate the excellent efficiency and practicality of our scheme when conducting cross-chain data sharing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Encryption; Cryptography; Relays; Medical diagnostic imaging; Access control; Smart contracts; Servers; Reliability; Privacy; Cross-chain data sharing; multi-authority attribute-based proxy re-encryption; access delegation; security

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TIFS.2024.3515812

Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains

【Author】 Song, Jie Zhang, Sijia Zhang, Pengyi Park, Junghoon Gu, Yu Yu, Ge

CCF-A

【影响因子】7.231

【主题类别】

--

【Abstract】recent years, blockchain anonymity has led to more illicit accounts participating in various money laundering transactions. Existing studies typically detect money laundering transactions, known as AML (Anti-money Laundering), through learning transaction features on transaction graphs of transactional blockchains. However, transaction graphs fail to represent the accounts' social features within transactional organizations. Account graphs reveal such features well, and detecting illicit accounts on account graphs provides a new perspective on AML. For example, it helps uncover illegal transactions whose transaction features are not distinct in transaction graphs, with a loose assumption that illicit accounts are likely involved in illegal transactions. In this paper, we propose a Social Attention Graph Neural Network ( SGNN ) on account graphs converted from transaction graphs. To detect illicit accounts, SGNN learns the social features on two sub-graphs, a heterogeneous graph and a hypergraph, extracted from the account graph, and fuses these features into account attribute vectors through attention. The experimental results on the Elliptic++ dataset demonstrate SGNN's advances. It outperforms the best baseline by 14.18% in precision, 7.37% in F1 score, 0.96% in accuracy, and 0.64% in recall when detecting illicit accounts on account graphs, as well as detects 20.3% more recall of illegal transactions through these illicit accounts than state-of-the-art methods based on transaction graphs when the mappings between illegal transactions and illicit accounts are provided. Moreover, thanks to social features, SGNN has a novel capability that works under many account scales and activity degrees. We release our code on https:// github.com/CloudLab-NEU/SGNN.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Feature extraction; Automated machine learning; Law; Bitcoin; Graph neural networks; Vectors; Machine learning algorithms; Data models; Clustering algorithms; Blockchain; anti-money laundering; social features; anonymity; cryptocurrency; graph neural network; attention mechanism

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TIFS.2024.3518068

Blockchain-facilitated quality traceability and pre-sale inspection: Influencing geographical indication supply chain contracts and farmer quality decisions

【Author】 Hu, Sensen Jin, Yishan Qin, Xinghong

【影响因子】7.180

【主题类别】

--

【Abstract】Geographical Indications (GIs) are increasingly prominent in the global economy, offering market leverage and propelling agricultural development. However, concerns arise that GI producers prioritize short-term gains over long-term quality assurance, leading to moral hazards and quality degradation. The prevalence of free-riding behavior within GI supply chains poses a collective action dilemma, significantly challenging the management of product quality. In this paper, we explore the integration of blockchain technology and quality inspections into GI supply chains as potential solutions for establishing reliable and effective quality management measures. We develop a two-tier model involving one retailer and two farmers to analyze the effects of quality inspection and blockchainbased traceability on product quality and the handling of substandard products. By assessing the optimal profits of retailers and farmers under various quality management models, we ascertain the strategy that achieves a Pareto-efficient improvements. Our research investigates the efficacy of blockchain-facilitated traceability and pre-sale inspection in shaping supply chain contracts, influencing quality decisions, and augmenting the overall value addition of blockchain integration. Despite the effectiveness of quality inspections in defect prevention, they fail to bolster overall earnings when implemented in isolation. Although the synergistic application of inspection and traceability substantially boosts GI supply chain profitability, our findings reveal that it does not increase farmers' income. Interestingly, farmers are unlikely to prefer a singular reliance on quality inspection. Nevertheless, under specific market conditions, the adoption of blockchain presents a mutually beneficial scenario for both farmers and retailers. Based on these insights, we provide theoretical and practical guidance for optimizing quality management strategies in GI supply chains.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Geographical Indication; Blockchain; Traceability; Inspection; Quality management

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.cie.2024.110769

Product tracing or component tracing? Blockchain adoption in a two-echelon supply chain management☆

【Author】 Babaei, Ardavan Khedmati, Majid Jokar, Mohammad Reza Akbari Tirkolaee, Erfan Babaee

【影响因子】7.180

【主题类别】

--

【Abstract】Consumer awareness of product authenticity and carbon footprint tracing are among the most remarkable reasons for adopting blockchain in the supply chain in today's world. However, the research literature has not yet examined specific ways to adopt blockchain in the supply chain. This study aims to develop a decision support tool to deal with the adoption of blockchain technology to design a two-echelon supply chain. In this regard, four specific cases for integrating supply chain and blockchain are developed based on types of tracing and block generation authority. In product tracing, green products are investigated throughout the supply chain, while in component tracing, green products are examined between the components of the supply chain. As it is necessary to record and verify the supply chain information by authorities in the blockchain network, in this work, such authorities are taken into account for both links and members of the supply chain. As far as we know, this is the first attempt to classify the various methods of adopting blockchain in Green Supply Chain Management (GSCM) and propose mathematical optimization models related to them. In this line, four Mixed-Integer Linear Programming (MILP) models with the aim of minimizing the costs related to the physical supply chain and blockchain deployment are developed for the integration of the supply chain with blockchain technology. They are treated by the Branch and Efficiency (B&E) algorithm and Simultaneous Data Envelopment Analysis (SDEA) model considering common (cost and service) and innovative (blockchain) criteria. The results showed that linkbased and component tracing models are cost-effective. In addition, the cost objective function of green product tracing is more sensitive to the number of blocks than that of component tracing. Eventually, the study provides great opportunities for decision-makers and managers to understand how to adopt blockchain in terms of supply chain network characteristics, cost, transparency, and service.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; Green supply chain management; Supply chain design; Green product tracing; Branch and efficiency algorithm; Simultaneous Data Envelopment Analysis

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.cie.2024.110789

Improving Participant Recruitment in Clinical Trials: Comparative Analysis of Innovative Digital Platforms

【Author】 Bikou, Alexia Georgia Deligianni, Elena Dermiki-Gkana, Foteini Liappas, Nikolaos Terius-Padron, Jose Gabriel Jaunsaras, Maria Eugenia Beltran Cabrera-Umpierrez, Maria Fernanda Kontogiorgis, Christos

【影响因子】7.076

【主题类别】

--

【Abstract】Background: Pharmaceutical product development relies on thorough and costly clinical trials. Participant recruitment and monitoring can be challenging. The incorporation of cutting-edge technologies such as blockchain and artificial intelligence has revolutionized clinical research (particularly in the recruitment stage), enhanced secure data storage and analysis, and facilitated participant monitoring while protecting their personal information. Objective: This study aims to investigate the use of novel digital platformsand their features, such as e-recruitment, e-consent, and matching, aiming to optimize and expedite clinical research. Methods: A review with a systematic approach was conducted encompassing literature from January 2000 to October 2024. The MEDLINE, ScienceDirect, Scopus, and Google Scholar databases were examined thoroughly using a customized search string. Inclusion criteria focused on digital platformsinvolving clinical trial recruitment phases that were in English and had international presence, scientific validation, regulatory approval, and no geographic limitations. Literature reviews and unvalidated digital platforms were excluded. The selected studies underwent meticulous screening by the research team, ensuring a thorough analysis of novel digital platformsand their use and features for clinical trials. Results: A total of 24 digital platforms were identified that supported clinical trial recruitment phases. In general, most of them (n=22, 80%) are headquartered and operating in the United States, providing a range of functionalities including electronic consent (n=14, 60% of the platforms), participant matching, and monitoring of patients' health status. These supplementary features enhance the overall effectiveness of the platforms in facilitating the recruitment process for clinical trials. The analysisand digital platform findings refer to a specific timeframe when the investigation took place, and a notable surge was observed in the adoption of these novel digital tools, particularly following the COVID-19 outbreak. Conclusions: This study underscores the vital role of the identified digital platformsin clinical trials, aiding in recruitment, enhancing patient engagement, accelerating procedures, and personalizing vital sign monitoring. Despitetheir impact, challenges in accessibility, compatibility, and transparency require careful consideration. Addressing these challenges is crucial for optimizing digital tool integration into clinical research, allowing researchers to harness the benefits while managing the associated risks effectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】clinical research; e -recruitment; patient matching; clinical trials; digital platforms; enrollment; electronic consent

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.2196/60504

A textual data-driven method to measure the capabilities and core paths of different digital technologies to improve supply chain resilience

【Author】 Lei, Zhimei Liu, Bingbing Lim, Ming Kim Lau, Yui-yip

【影响因子】5.992

【主题类别】

--

【Abstract】This study expands current path research, which focuses on single digital technologies and singular types of mediating factors, by synthesising the findings from existing empirical, simulation, and textual content analyses to elucidate the multidimensional impact mechanisms of various digital technologies on SCR through a combination of static and dynamic path modelling. The results identify the most influential digital technologies and core pathways at different stages of research, revealing the dynamic evolutionary characteristics of the impact capabilities and pathways of digital technologies. Across all the research stages, blockchain technology (BCT) has the highest impact capability for improving SCR, SC disruption (NM-Dr) is the most important core negative mediating factor, and SC visibility (PM-Vis) is the most significant core positive mediating factor. The findings of this study assist supply chain managers across industries and related scholars in recognising the most suitable and potent digital technologies and the realisation path to enhance SCR.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital technologies; supply chain resilience; core paths; impact capability; systematic literature review; heterogeneous information network

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/13675567.2024.2446247

A blockchain-based secure data sharing scheme with efficient attribute revocation

【Author】 Li, Siyue Niu, Kele Wu, Bin

【影响因子】5.836

【主题类别】

--

【Abstract】With the growth of interdisciplinary projects, cooperation among organizations and secure file sharing are increasingly crucial. The lead party manages these files and must ensure project participants can access them while preventing unauthorized access. CP-ABE(Ciphertext-Policy Attribute-Based Encryption) demonstrates advantages in achieving fine-grained access control through its unique encryption and decryption strategy. However, flawed permission management, lack of traceability and complex ciphertext updatings present challenges. To address these issues, we propose an enhanced CP-ABE scheme for secure data sharing and participant management, along with a tree-based searchable encryption for file index protection. The chameleon hash function assigns unique identities to participants, preventing unauthorized access. Smart contracts and blockchain ensure traceability, and a re-encryption scheme efficiently updates ciphertext without modifying ciphertext of project files. Our solution enhances data sharing efficiency, protects file confidentiality, and enables malicious activity traceability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】CP-ABE; Blockchain; Searchable encryption; Data sharing; Access control

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.sysarc.2024.103309

Physical unclonable functions and QKD-based authentication scheme for IoT devices using blockchain

【Author】 Cunha, Tyson Baptist D. Kiran, M. Ranjan, Ritik Vasilakos, Athanasios V.

【影响因子】5.711

【主题类别】

--

【Abstract】As the number of Internet of Things (IoT) devices is increasing exponentially, strong security measures are needed to guard against different types of cyberattacks. This research offers a novel IoT device authentication technique to mitigate these challenges by integrating three cutting-edge technologies namely blockchain technology, Quantum Key Distribution (QKD), and Physically Unclonable Functions (PUFs). By utilizing the distinctive qualities of PUFs for device identification and the unrivaled security of QKD for key exchange, the proposed approach seeks to address the significant security issues present in IoT environments. Adopting blockchain technology ensures transparency and verifiability of the authentication process across distributed IoT networks by adding an unchangeable, decentralized layer of trust. An examination of the computing and communication costs reveals that the proposed protocol is effective, necessitating low computational resources that are critical for IoT devices with limited resources. The protocol's resistance against a variety of attacks is demonstrated by formal proofs based on the Real-Or-Random (ROR) model and security evaluations using the Scyther tool, ensuring the integrity and secrecy of communications. Various threats are analyzed, and the protocol is proven to be secure and efficient from all forms of attacks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】PUF; QKD; Authentication; ROR model; Blockchain; Scyther

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.iot.2024.101404

Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms

【Author】 Li, Jizi Wang, Xiaodie Li, Longyu Zhao, Dangru

【影响因子】5.318

【主题类别】

--

【Abstract】This paper investigates using blockchain technology to fight deceptive counterfeits in an electronic commerce environment. Thereby, a two-period pricing model is built under two competitive platforms: a blockchain-based platform which ensures product authentication and provides a higher value to customers but increases customers' privacy concerns, and its rival (i.e., the traditional platform) in the absence of blockchain implementation which is perceived as having a lower value due to the existence of deceptive counterfeits and thus faces more government enforcement. Customers on both platforms are influenced by the electronic word-of-mouth (eWOM) effect, and customers value a platform more if the platform has more online sales. The two platforms either adopt the fixed pricing scheme or the modifiable pricing scheme and so four possible cases may occur. By deriving the equilibrium of each possible case, we analytically find that the attenuation of consumer privacy concerns, increases in government enforcement efforts, and eWOM can benefit the platform's adoption of blockchain technology to combat counterfeits, and a strong eWOM effect is conducive to consumers but deteriorates price competition and thus harms both platforms. Whether the pricing schemes enhance the competitiveness of the blockchain-based platform over its rivals depends on the eWOM effect and the advantage gained from adopting blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; privacy concerns; deceptive counterfeit; pricing scheme; government enforcement

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/jtaer19040158

Effects of Promotional Bundles with Non-Fungible Token (NFT) Fashion on Consumers' Perceptions

【Author】 Kim, Seong Eun Lee, Jung Eun Youn, Song-yi

【影响因子】5.318

【主题类别】

--

【Abstract】The rapid expansion of the non-fungible token (NFT) market, which grew over 200% in 2023 to reach $22 billion, has opened new avenues for fashion brands to engage consumers through digital fashion products under blockchain technology. This study investigated the effects of NFT promotional bundles that combine physical and NFT fashion items as a pair on consumer perceptions. By investigating the interaction effect between the brand type (luxury vs. non-luxury) and promotional bundle types (PHY+free NFT vs. NFT+free PHY), the research demonstrated how these bundles influenced consumers' perceived value, risk, and authenticity according to the brand type. The findings showed that while a freebie physical item can enhance consumers' perceived value of NFT products for non-luxury brands, it led to value-discounting inferences, particularly for luxury brands. This study contributes to the literature on NFT fashion by exploring consumer perceptions and providing insights for fashion retailers on effectively framing promotional bundles to maximize consumer engagement for NFT fashion products.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】non-fungible token; NFT; promotional bundle; perceived value; perceived risk

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/jtaer19040161

Linear block cipher and category based random opposition learning for secured electronic health record sharing

【Author】 Natarajan, M. Bharathi, Dr. A.

【影响因子】5.076

【主题类别】

--

【Abstract】Medical application is growing at mode for expertise application and patient-oriented relevance. Establish the health documentation yet group impartial total issues related to security and privacy. Blockchain is employed with cryptocurrencies and also stores all types of data in a securitized manner for Electronic Health Records sharing systems. Machine Learning is one more flourishing region that specifically utilizes electronic healthcare relevance. Hence, blockchain and IPFS (InterPlanetary File System) are introduced to address the security and privacy issues. In this work, a Linear Feedback Shift Register with Category-based Random Opposition Learning (LFSR-CROL) employing IPFS is introduced to secure electronic health record sharing. The LFSR-CROL method is split into three parts. First, a Hyperledger-based Blockchain is employed to store and share the data with the raw healthcare dataset as input. The Markov Decision Proof of Authority is used to perform validation for secure data sharing. The encryption/decryption is performed with a Simon Linear Feedback Shift Register Block Cipher. Finally, Category-based Random Opposition is used to create an optimal key. In this way, data confidentiality and integrity are enhanced. Experimental evaluation is carried out using the U.S. Healthcare dataset with different factors. The results of the proposed LFSR-CROL method is achieved by improved confidentiality and integrity minimum data delivery time, and computational overhead when compared to state-of-art-of methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Machine learning; Inter planetary file system; Markov decision proof of authority; Simon block cipher; Linear feedback shift register; Random opposition

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.bspc.2024.107194

An efficient sharding consensus protocol for improving blockchain scalability

【Author】 Lu, Li Sun, Linfu Zou, Yisheng

CCF-C

【影响因子】5.047

【主题类别】

--

【Abstract】A consortium blockchain facilitates establishment credit among supply and demand agents on a cloud platform. HotStuff, a Byzantine fault-tolerance consensus protocol, predominates the consortium blockchains and has undergone extensive research and practical applications. However, its scalability remains limited with an increased number of nodes, making it unsuitable for large-scale transactions. Consequently, an improved sharding consensus protocol (IShard) is proposed to consider decentralization, security, and scalability within the consortium blockchain. First, IShard employs the jump consistent hash algorithm for reasonable node allocation within the network, thus reducing data migration resulting from shard modifications. Second, a credit mechanism is devised to reflect credit based on the behavior of nodes, optimizing consensus nodes to enhance performance. Third, a credit-based consensus protocol is introduced to concurrently handle transactions through sharding among multiple shards, distributing transactions to each shard to alleviate the overall burden, thus enhancing the scalability of the blockchain. Fourth, a node removal mechanism is devised to identify and eliminate Byzantine nodes, minimizing view changes and ensuring efficient system operation in an environment susceptible to Byzantine faults. Finally, IShard has demonstrated its ability to ensure security and liveness in shard transactions, subject to particular constraints regarding Byzantine nodes. In addition, transaction processes involving supply and demand agents are designed to enhance data reliability. Experimental results demonstrate that IShard surpasses current leading protocols, achieving a communication complexity of O(n) and superior throughput and scalability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Consensus protocol; Sharding; Consortium blockchain; Credit; Cloud platform

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.comcom.2024.108032

Blockchain-Assisted Flexible Revocable Anonymous Authentication in Industrial Internet of Things

【Author】 Wang, Fengqun Cui, Jie Zhang, Qingyang He, Debiao Zhong, Hong

【影响因子】5.033

【主题类别】

--

【Abstract】In Industrial Internet of Things (IIoT) systems, data sharing between industrial departments is often utilized to optimize management models and improve decision-making efficiency. To enable secure data sharing, authentication between smart devices is critical. However, existing authentication schemes do not comprehensively consider data anonymity, data traceability, pseudonym management, and flexible revocation of devices, which cannot meet the needs of IIoT systems for security, real-time, and dynamicity. Therefore, we propose a blockchain-assisted lightweight authentication scheme. First, we design a lightweight authentication method based on Okamoto's protocol and elliptic curve cryptography, which achieves fast authentication of smart devices while ensuring data anonymity and traceability. Second, we design a two-level key derivation algorithm and combine it with blockchain technology to address the issue of pseudonym management. Smart devices can generate pseudonyms without requesting them from the key generation center and can be revoked flexibly. Third, security proof and analysis demonstrate that the proposed scheme achieves the security objectives and is resistant to various common attacks. Finally, the performance evaluation results show that our proposed scheme performs better than the other related schemes regarding computational and communication overheads.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; consortium blockchain; Industrial Internet of Things (IIoT); key derivation; consortium blockchain; Industrial Internet of Things (IIoT); key derivation

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/TNSE.2024.3503996

An asynchronous federated learning-assisted data sharing method for medical blockchain

【Author】 Gan, Chenquan Xiao, Xinghai Zhang, Yiye Zhu, Qingyi Bi, Jichao Jain, Deepak Kumar Saini, Akanksha

CCF-C

【影响因子】5.019

【主题类别】

--

【Abstract】Currently, medical blockchain data sharing methods that rely on federated learning face challenges, including node disconnection, vulnerability to poisoning attacks, and insufficient consideration of conflicts of interest among participants. To address these issues, we propose a novel method for data sharing in medical blockchain systems based on asynchronous federated learning. First, we develop an aggregation algorithm designed specifically for asynchronous federated learning to tackle the problem of node disconnection. Next, we introduce a Proof of Reputation (PoR) consensus algorithm and establish a consensus committee to mitigate the risk of poisoning attacks. Furthermore, we integrate a tripartite evolutionary game model to examine conflicts of interest among publishing nodes, committee nodes, and participating nodes. This framework enables all parties involved to make strategic decisions that promote sustainable data-sharing practices. Finally, we conduct a security analysis to validate the theoretical effectiveness of the proposed method. Experimental evaluations using real medical datasets demonstrate that our method outperforms existing approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical blockchain; Data sharing; Asynchronous federated learning; Proof of reputation; Tripartite evolutionary game

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10489-024-06172-9

Strategic model for integrating biogas a framework for sustainable energy integration in agro-industries

【Author】 Nahwani, Ahmad Soeprijanto, Soeprijanto Widodo, Erwin

【影响因子】4.996

【主题类别】

--

【Abstract】The framework of the methodology presented in this study is an effort to integrate and optimize the agro-industry sector, especially energy in biogas. In this study, the technique of the system in functional analysis is shown systematically to translate various energy requirements in the factory as criteria for performance and functional design to be integrated, optimized, and energy efficient. The case study results indicated that biogas power plants, with a capacity of 1.5 MW, can produce around 13,140 MWh per year. The annual return on investment (ROI) is around 37.13%. With this ROI value, the payback period is 31 months. The overall reduction of greenhouse gases is approximately 77,826 tons CO2 eq/year. The potential value of carbon trading is about USD 3,113,040 per year. This strategic model presents a novel approach by integrating biogas energy production with a customized wastewater treatment system adapted to biodigesters' effluent characteristics. It offers a sustainable, economically feasible, and scalable solution, combining resource recovery, waste minimization, and potential for carbon trading into a unified system. The novelty of this research lies in maximizing the utility of biogas plants by efficiently treating and reusing wastewater, creating a closed-loop, zero-waste process. Future research on hybrid systems integrating Biogas power plants by focusing on efficiency optimization, economic feasibility, environmental impacts, and innovative approaches like AI and blockchain could make the hybrid system a more robust, scalable, and sustainable solution. Thus, the framework based on the results of this study finds tools that can maximize and integrate energy sources, especially biogas, in the agro-industrial sector.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Biogas Integration; Agro-Industry; Sustainable Energy; Carbon Trading; Renewable Energy

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-83181-1

An improved practical Byzantine fault tolerance algorithm for aggregating node preferences

【Author】 Liu, Xu Zhu, Junwu

【影响因子】4.996

【主题类别】

--

【Abstract】Consensus algorithms play a critical role in maintaining the consistency of blockchain data, directly affecting the system's security and stability, and are used to determine the binary consensus of whether proposals are correct. With the development of blockchain-related technologies, social choice issues such as Bitcoin scaling and main chain forks, as well as the proliferation of decentralized autonomous organization (DAO) applications based on blockchain technology, require consensus algorithms to reach consensus on a specific proposal among multiple proposals based on node preferences, thereby addressing the multi-value consensus problem. However, existing consensus algorithms, including Practical Byzantine Fault Tolerance (PBFT), do not support nodes expressing preferences. Instead, the proposal to reach consensus is directly decided by specific nodes, with other nodes merely verifying the proposal's validity, which can easily result in monopolistic or dictatorial outcomes. In response, we proposed the Aggregating Preferences with Practical Byzantine Fault Tolerance (AP-PBFT) consensus algorithm, which allows nodes to express preferences for multiple proposals. AP-PBFT ensures the validity of consensus results through a consensus output protocol, and incentivizes nodes to act honestly during the consensus process by incentive mechanism. First, AP-PBFT leverages Verifiable Random Function to select both consensus nodes and a primary node from the candidates. The primary node gathers proposals, assembles them into a proposal package, and broadcasts it to other consensus nodes. The consensus nodes independently vote to express their preferences for different proposals in the package, execute the consensus output protocol to reach local consensus, and the primary node aggregates these results to form the global consensus. Once the global consensus is finalized, AP-PBFT evaluates node behavior based on the consensus output protocol, penalizes nodes that acted maliciously, and rewards those that adhered to the protocol. Additionally, nodes can interact and adopt different strategies while executing the consensus output protocol, which can influence the consensus outcome. Therefore, we established an evolutionary game model based on hypergraph to analyze these interactions. Theoretical analysis shows that the incentive mechanism in AP-PBFT effectively encourages nodes to honestly follow the consensus output protocol, ensuring that AP-PBFT satisfies the properties of consistency, validity, and termination. Finally, the simulation results demonstrate that the AP-PBFT algorithm possesses good scalability and the capability to handle dynamic changes in nodes, surpassing some mainstream consensus algorithms in terms of transaction throughput and consensus achievement time. Moreover, AP-PBFT can incentivize honest behavior among consensus nodes, thereby enhancing the reliability of consensus and strengthening the security of the network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Distributed system; Blockchain; Consensus algorithm; Voting; Evolutionary game; Incentive mechanism

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-82579-1

A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks

【Author】 Al-Matari, Nassmah Y. Zahary, Ammar T. A. Al-Shargabi, Asma

【影响因子】4.996

【主题类别】

--

【Abstract】The emergence of 6G cognitive radio IoT networks introduces both opportunities and complexities in spectrum access and security. Blockchain technology has emerged as a viable solution to address these challenges, offering enhanced security, transparency, and efficiency in spectrum management. This survey paper offers a thorough analysis of recent advancements in blockchain-enabled security mechanisms specifically for spectrum access within 6G cognitive radio IoT networks. Covering literature from 2019 to the present, the paper highlights significant contributions and developments in integrating blockchain technology with cognitive radio and IoT systems. It reviews spectrum access security and shows how blockchain's decentralized approach can solve related issues. Key areas of focus include secure authentication systems, tamper-resistant spectrum sensing, decentralized databases, and smart contracts for spectrum management. The paper also addresses ongoing challenges like interoperability, scalability, and the need for comprehensive security frameworks. Future research directions are proposed, emphasizing the development of advanced blockchain protocols, integration with machine learning, and addressing regulatory and standardization concerns. This paper provides valuable insights for researchers and practitioners aiming to leverage blockchain technology, alongside ML/AI, to enhance security and efficiency in next-generation cognitive radio IoT networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Sixth-Generation (6G); Cognitive radio (CR); Internet of things (IoT); Spectrum Access; Security

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-82126-y

A secure and efficient blockchain enabled federated Q-learning model for vehicular Ad-hoc networks

【Author】 Ahmed, Huda A. Jasim, Hend Muslim Gatea, Ali Noori Al-Asadi, Ali Amjed Ali Al-Asadi, Hamid Ali Abed

【影响因子】4.996

【主题类别】

--

【Abstract】Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained. This research proposes an extra level of security to Federated Q-learning by merging Blockchain technology with VANETs. Initially, traffic data is encrypted utilizing the Extended Elliptic Curve Cryptography (EX-ECC) technique to enhance the security of data. Then, the Federated Q-learning model trains the data and ensures higher privacy protection. Moreover, interplanetary file system (IPFS) technology allows Blockchain storage to improve the security of VANETs information. Additionally, the validation process of the proposed Blockchain framework is performed by utilizing a Delegated Practical Byzantine Fault Tolerance (DPBFT) based consensus algorithm. The proposed approach to federated Q-learning offered by Blockchain technology has the potential to develop VANET safety and performance. Comprehensive simulation tests are performed with several assessment criteria considered for number of vehicles 100, Throughput (102465.8 KB/s), Communication overhead (360.57 Mb), Average Latency (864.425 ms), Communication Time (19.51 s), Encryption time (0.98 ms), Decryption time (1.97 ms), Consensus delay (50 ms) and Validation delay (1.68 ms), respectively. As a result, the proposed approach performs significantly better than the existing approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicular Ad-hoc networks (VANETs); Blockchain system; Federated Q-learning; Extended elliptic curve cryptography (EX-ECC); Interplanetary file system (IPFS); Delegated practical byzantine fault tolerance (DPBFT).

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-82585-3

Optimizing demand response and load balancing in smart EV charging networks using AI integrated blockchain framework

【Author】 Singh, Arvind R. Kumar, R. Seshu Madhavi, K. Reddy Alsaif, Faisal Bajaj, Mohit Zaitsev, Ievgen

【影响因子】4.996

【主题类别】

--

【Abstract】The integration of Electric Vehicles (EVs) into power grids introduces several critical challenges, such as limited scalability, inefficiencies in real-time demand management, and significant data privacy and security vulnerabilities within centralized architectures. Furthermore, the increasing demand for decentralized systems necessitates robust solutions to handle the growing volume of EVs while ensuring grid stability and optimizing energy utilization. To address these challenges, this paper presents the Demand Response and Load Balancing using Artificial intelligence (DR-LB-AI) framework. The proposed framework leverages Artificial intelligence (AI) for predictive demand forecasting and dynamic load distribution, enabling real-time optimization of EV charging infrastructure. Furthermore, Blockchain technology is employed to facilitate decentralized, secure communication, ensuring tamper-proof energy transactions while enhancing transparency and trust among stakeholders. The DR-LB-AI framework significantly enhances energy distribution efficiency, reducing grid overload during peak periods by 20%. Through advanced demand forecasting and autonomous load adjustments, the system improves grid stability and optimizes overall energy utilization. Blockchain integration further strengthens security and privacy, delivering a 97.71% improvement in data protection via its decentralized framework. Additionally, the system achieves a 98.43% scalability improvement, effectively managing the growing volume of EVs, and boosts transparency and trust by 96.24% through the use of immutable transaction records. Overall, the findings demonstrate that DR-LB-AI not only mitigates peak demand stress but also accelerates response times for Load Balancing, contributing to a more resilient, scalable, and sustainable EV charging infrastructure. These advancements are critical to the long-term viability of smart grids and the continued expansion of electric mobility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Artificial intelligence; Demand response; EV charging stations; Load balancing

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-82257-2

A hierarchical overlay network optimisation model for enhancing data transmission performance in blockchain systems

【Author】 Cheng, Longle Tan, Haibo Li, Xiru Pan, Wansu Zhao, He Yuan, Munan Li, Xiaofeng

【影响因子】4.996

【主题类别】

--

【Abstract】The network layer plays a crucial role in blockchain systems, enabling essential functions such as message broadcasting and data synchronization. Enhancing data transmission structures and methods at this layer is key to improving scalability and addressing performance limitations. Currently, the uneven distribution of neighboring node lists and the lack of awareness of underlying linkages in coverage networks hinder the efficiency and comprehensiveness of information transmission. To tackle these challenges, this study introduces a dual-layer transmission model, FPSblo-EP, which divides the blockchain P2P network into two layers: the regular node layer and the tagged node layer. In the initial stage, network nodes are treated as points in a point cloud, and farthest point sampling is applied to the P2P network nodes. During this process, geographic distances between nodes serve as input parameters, while node degrees are used as point weights. Tagged nodes can then provide efficient and stable inter-group routing for regular nodes, creating a hierarchical transmission architecture. This model improves both transmission performance and scalability in blockchain overlay networks. Experimental results show that FPSblo-EP reduces message coverage latency by 22%, redundancy by 26%, and the network stretch coefficient by 28%, demonstrating superior load-balancing capabilities and enhanced network reliability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1038/s41598-024-83399-z

The interplay between blockchain and big data analytics for enhancing supply chain value creation in micro, small, and medium enterprises

【Author】 Jabbar, Abdul Akhtar, Pervaiz Ali, Syed Imran

【影响因子】4.820

【主题类别】

--

【Abstract】This study explores the interplay between blockchain-based smart contracts and big data analytics for the supply chain value creation of micro, small, and medium enterprises (MSMEs). We implement our Ethereum Virtual Machine (EVM) procedure with the ganache blockchain, and addresses generated by the Metamask wallet. Each supply chain player in the blockchain is assigned a wallet address to observe the hashes created when data is added to the blockchain. Our findings unfold that supply chain value creation emphasises traceability, transparency, security, and profit maximisation interlocked with how effectively companies utilise big data collected through blockchain-based smart contracts. This subsequentially assists managers in using data types and a variety of analytics, spanning from descriptive, diagnostic, predictive, and prescriptive to cognitive analytics. This synergy between the blockchain and the types of analytics provides opportunities to identify new interactions and directions for future research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart contracts; Big data analytics; Supply chain value creation; Micro, small and medium enterprises

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10479-024-06415-5

Research on smart contracts for Omnipresent AI in commercial health insurance

【Author】 Hsiao, Tsung-Chih Chen, Tzer-Long Chang, Shu-Chen Chang, Tsui-Ping

【影响因子】4.407

【主题类别】

--

【Abstract】This research explores how integrating Omnipresent AI and smart contracts enhances the efficiency of medical insurance claims in commercial health insurance. AI enables real-time data processing, instantly accessing and evaluating medical records from secure ledgers. Blockchain technology integrates these records with smart contract policies for swift, accurate assessments. Smart contracts, hosted on a third-party certification platform, authenticate, grant access, and document the process, eliminating manual application for records. This streamlines claim reviews, enabling immediate payouts to policyholders. By leveraging AI, blockchain, and smart contracts, this approach optimizes efficiency, reduces costs, and accelerates settlements for insured beneficiaries.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Omnipresent AI; smart contract; commercial health insurance; digitalisation; blockchain

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/17517575.2024.2442405

Revolutionizing internal auditing: harnessing the power of blockchain

【Author】 Wu, Hua Ping Liu, Zi Hao Dong, Hong Yu Lu, Yang Xu, Li Da

【影响因子】4.407

【主题类别】

--

【Abstract】Blockchain technology offers new opportunities for enhancing accounting and auditing, particularly in dynamic, intelligent internal auditing. This paper analyzes blockchain integration with internal auditing, designing smart contract-based algorithms for identity management, data collection, auditing calculations, analysis, and storage. A real-time auditing model using smart contracts is proposed, with a carbon emissions audit used to demonstrate its effectiveness. Results show the model enhances auditing performance in terms of intelligence, independence, efficiency, and quality. This study is a valuable attempt to illustrate how blockchain can empower auditing and create value.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internal auditing; blockchain; smart contract; carbon emission

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/17517575.2024.2448003

A blockchain and IPFS-Aided anonymous traitor tracing scheme based on puncturable encryption in Industrial Internet of Things

【Author】 Liu, Yan Hu, Yingzi Lv, Xinyan Zhou, Sitong Li, Jiongru Liu, Shuanggen

【影响因子】4.152

【主题类别】

--

【Abstract】The development of intelligent industrial Internet of Things has improved production efficiency, but at the same time, it has also put forward higher requirements for security protection. When data is shared between IoT devices, many systems use attribute-based encryption primitives to encrypt the data and upload it to the cloud. However, ABE will have the problem that it is difficult for a single user to revoke, the attribute will be leaked, and the privacy of users with the same attribute will also be leaked. In addition, the amount of data in IIoT is huge, and there will be bottlenecks in data storage. In this paper, we propose a blockchain and IPFSassisted puncturable-based anonymous traitor tracing scheme on the IIoT. The combination of blockchain and IPFS solves the problem of data storage, realizes the scalability of storage, the anonymity protects the privacy of users, and the puncturable encryption provides the dynamic revocation of users without affecting the normal decryption of this system by other users. Combined with traitor tracing technology, the malicious user who leaked the private key can be traced, and the user who leaked the data can be traced through the data access records on the blockchain, Security analysis shows that the scheme has IND-CPA security, Theoretical analysis and simulation results show that this scheme is superior to other schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Traitor tracing; Puncturable encryption; Industrial Internet of Things; Blockchain; Interplanetary file system

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.compeleceng.2024.109896

How Does Blockchain Technology Contribute to the Development and Functioning of Smart Cities?-A Scoping Review and Future Research Directions

【Author】 Sahoo, Saumyaranjan Kumar, Satish Vyas, Mukund

【影响因子】4.142

【主题类别】

--

【Abstract】Smart cities leverage blockchain technology to increase the quality of urban life by effectively tackling the many challenges that arise from the rapid process of urbanization. Recognizing the increasing significance of the subject matter, it becomes essential to conduct a comprehensive assessment of the current state of research in this domain. To do so, 79 articles from top-tier journals were selected from the Scopus database and studied using a systematic literature review approach to identify the performance of contributing research constituents and underlying themes that map the topic. The findings of the performance analysis indicated that authors associated with American, Chinese, and Indian institutions were the primary contributors in terms of number, whileauthors affiliated with French and American institutions were the primary contributors in terms of impact. Furthermore, the findings of the science mapping analysis revealed the identification of five knowledge clusters: (1) Blockchain-based urban mobility and transportation; (2) blockchain for secure and transparent urban governance; (3) decentralized and efficient resource management; (4) internet of things integration and data security; and (5) digital identity and access control. Based on a content analysis approach, future research avenues were determined for each of the aforementioned knowledge clusters.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; circular economy; digital identity; smart city; systematic literature review; urban governance; urban mobility

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1111/joes.12679

Establishing Trust and Security in Decentralized Metaverse: A Web 3.0 Approach

【Author】 Hadish, Siem Gebre, Daniel Sbhatu, Aron Aloqaily, Moayad Guizani, Mohsen

【影响因子】4.094

【主题类别】

--

【Abstract】The integration of blockchain and Web 3.0 technologies offers significant advancements in identity management and trust within decentralized Metaverse environments. Despite the rapid development of numerous Metaverse platforms, these environments often operate in isolation, lacking interoperability and cohesive security measures. This article proposes a novel architecture leveraging self-sovereign identity (SSI) principles and blockchain technology to achieve secure and interoperable interactions across different Metaverse platforms. Our framework encompasses a digital wallet application, an interactive virtual environment, and a secure blockchain-based backend infrastructure. We detail the system architecture, operational specifics, and demonstrate significant improvements in scalability, efficiency, and security through comprehensive performance evaluations. Additionally, we address the challenges of real-world implementation and propose viable solutions. By enhancing user control over personal data and enabling secure cross-platform interactions, our approach aims to foster a more secure, interoperable, and user-centric decentralized Metaverse.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Additional Key Words and Phrases: Metaverse; Cryptography; Interoperability; Trust; Self-Sovereign Identity

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1145/3696454

The value of crypto? Sociotechnical imaginaries on cryptocurrency in YouTube content

【Author】 De Keere, Kobe Trans, Martin Milan, Stefania

【影响因子】4.058

【主题类别】

--

【Abstract】In less than two decades, cryptocurrency has transformed from being an object of interest for an obscure online community to becoming a digital asset of global appeal. By acknowledging the importance of fictional expectations in the creation of economic value, this study addresses the question: How is the value of crypto imagined? Through quantitative and qualitative coding of 1921 YouTube video transcripts, combined with Exploratory Factor Analysis, this article maps out the sociotechnical imaginaries that attribute value to crypto, that are being disseminated on YouTube. This study identifies four distinct imaginaries that project a value on cryptocurrency: investment, utility, digital metallism, and infrastructural mutualism imaginary. This explorative analysis sheds light on the potential value consumers attribute to cryptocurrencies while opening new research avenues toward a better understanding of the market and its mediation by platform algorithms as potential market devices.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】finance; technology; economic sociology; value; markets; G10 general financial markets; Z1 cultural economics; economic anthropology

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1093/ser/mwae081

Investment in enhancing resilience safety of chemical parks under blockchain technology: From the perspective of dynamic reward and punishment mechanisms

【Author】 Su, Chang Deng, Jun Li, Xiaoyang Huang, Wenhong Ma, Jiayi Wang, Caiping Wang, Xinping

【影响因子】3.916

【主题类别】

--

【Abstract】Industry and academia have long focused on safety risk management in chemical parks, and resilient safety is becoming a new goal for risk and emergency management in parks. In the context of blockchain, what is the behavioral law of chemical enterprises investing for resilient safety is a scientific question that needs to be studied urgently. This paper effectively combines prospect theory, mental account and evolutionary game theory, considers the herd effect, establishes a hypothetical model of limited rationality of chemical park resilience safety investment actors (core enterprises, supporting enterprises and local government regulators), analyzes the evolutionary stabilization strategies of the core enterprises, supporting enterprises and local government regulators under the static and dynamic rewards and punishments mechanisms, and finally, further conducts a Finally, numerical simulation analysis is further carried out. The results show that (1) the resilient safety investment of chemical park enterprises is jointly influenced by multiple factors, including external incentives and subjective factors of decision makers. (2) The government's dynamic reward and punishment mechanism can more effectively incentivize enterprises to invest in resilience safety. (3) Reducing the psychological pressure among supporting enterprises and reducing the influence of herd effect can push the system to tend to the state of positive investment. The marginal contribution of this paper is to reveal the evolution law of chemical park resilience safety investment behavior under blockchain technology. The findings provide empirical evidence for promoting resilient safety investment in chemical parks and enhancing the level of resilient safety in the parks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; Chemical parks; Resilient safety investments; Evolutionary gaming

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1016/j.jlp.2024.105523

Starting from Scratch: The Articulated Development of a Smart City in Limerick, Ireland

【Author】 Raza, Syed Sundus Reeves, Eoin

【影响因子】3.889

【主题类别】

--

【Abstract】This paper analyses the situated practice of developing a smart city in Limerick, Ireland. It maps out, at a city scale, how the development of the smart city was planned, organised, and governed, as well as ongoing challenges. It addresses two of the principal gaps in the smart city literature, namely, the scarcity of in-depth case studies based on extensive fieldwork and the shortage of studies on smart city development on brownfield sites. Source material was gathered through desk research and interviews with key stakeholders. Limerick adopted an articulated strategic approach to smart city development. The local government's dedicated smart city unit played a vital role in planning, managing, and implementing smart city operations. The local government did not centralise the smart city development process. Over time, there has been a gradual shift towards the development of Quadruple Helix collaborations and a balance between top-down and bottom-up approaches. The paper also identifies the challenges that might restrain Limerick's smart city ambitions. These include financial, budgetary, technological, and human resources challenges. It also identifies the challenge of digital exclusion and the need for greater citizen involvement in smart city development.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】smart city; smart city development; smart city governance; digital strategy; sustainability

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162411157

Managing Digital Evidence in Cybercrime: Efforts Towards a Sustainable Blockchain-Based Solution

【Author】 Ratul, Md Hasibul Alam Mollajafari, Sepideh Wynn, Martin

【影响因子】3.889

【主题类别】

--

【Abstract】Digital evidence plays a crucial role in cybercrime investigations by linking individuals to criminal activities. Data collection, preservation, and analysis can benefit from emerging technologies like blockchain to provide a secure, distributed ledger for managing digital evidence. This study proposes a blockchain-based solution for managing digital evidence in cybercrime cases in the judicial domain. The proposed solution provides the basis for the development of a new model that leverages a consortium blockchain, allowing secure collaboration among judicial stakeholders, while ensuring data integrity and admissibility in court. An extensive literature review demonstrates blockchain's potential to create a more secure, efficient evidence management system. The proposed model was implemented in a test environment using a localised blockchain for developing and testing smart contracts, as well as integrating a web interface, with off-chain storage for managing evidence data. The system was subsequently deployed in both the Polygon and Ethereum test networks, simulating real-world blockchain environments, revealing that the operational cost in the Polygon network is reduced by 99.96% compared to Ethereum, thereby offering scalability without compromising security. This study underscores blockchain's potential to revolutionise the chain of custody procedures, improving dependability and security in evidence management and providing more sustainable solutions within the criminal justice system.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; chain of custody; data integrity; sustainability; secure distribution; access control

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162410885

Applying Entropy Weighting and 2-Tuple Linguistic T-Spherical Fuzzy MCDM: A Case Study of Developing a Strategic Sustainability Plan for Istanbul Airport

【Author】 Mizrak, Filiz Polat, Levent Tasar, Sezin Acik

【影响因子】3.889

【主题类别】

--

【Abstract】This study presents a novel sustainability plan tailored for Istanbul Airport, leveraging advanced decision-making methodologies to address the urgent need for sustainable practices in aviation. By integrating the entropy weighting and 2-tuple linguistic T-spherical fuzzy multi-criteria decision-making (MCDM) models, the study offers a comprehensive approach to evaluating and prioritizing sustainability criteria based on expert input from 12 professionals. The novelty of this research lies in its unique combination of advanced MCDM techniques with cutting-edge technologies, including IoT-enabled monitoring systems, digital twin models, blockchain-based sustainability reporting, and carbon capture initiatives, tailored specifically for large-scale airport operations. The study develops a phased implementation roadmap comprising three stages: (1) a short-term focus on energy efficiency and renewable energy infrastructure, achieving significant cost reductions within a 3-7.5-year payback period; (2) medium-term initiatives integrating IoT and digital twins to enhance operational efficiency; and (3) long-term measures incorporating carbon capture and blockchain for transparency and compliance. Key implementation steps include upgrading energy systems, deploying IoT sensors, creating digital replicas of airport infrastructure, and establishing regulatory and stakeholder collaboration frameworks. This research contributes a replicable framework for airports worldwide, bridging theoretical models with actionable solutions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】sustainability; aviation management; financial sustainability; cost-benefit analysis; entropy weighting; 2-tuple linguistic T-spherical fuzzy MCDM

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162411104

Blockchain Adoption for a Circular Economy in the Chinese Automotive Industry: Identification of Influencing Factors Using an Integrated TOE-TAM Model

【Author】 Chen, Jun Abdul-Hamid, Asma-Qamaliah Zailani, Suhaiza

【影响因子】3.889

【主题类别】

--

【Abstract】Although the potential of the blockchain has been extensively recognized by scholars and practitioners across multiple fields, research on its adoption in the framework of the circular economy (CE) is still scarce. In this context, this study extends the technology acceptance model (TAM) by integrating the technology-organization-environment (TOE) framework to holistically understand how technological perception factors (perceived usefulness and perceived ease of use) interact with organizational and environmental factors in influencing the intention to adopt the blockchain in the CE within the context of the Chinese automotive supply chain. Based on survey data from 305 respondents from Chinese automotive companies, the proposed hybrid TOE-TAM conceptual model was validated. The results indicate that, except for the effects of the knowledge management capability on the perceived ease of use and regulatory support on blockchain adoption intention, all of the other hypotheses are deemed significant. Moreover, by conducting an in-depth analysis of the evolution of blockchain adoption intention in the CE, this study not only deepens the understanding of how the technology is disseminated but also provides valuable insights to theory and practice within the Chinese automotive value chain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; circular economy; TOE framework; TAM; automotive; China

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162410817

Blockchain-Driven Carbon Accountability in Supply Chains

【Author】 Alotaibi, Eid M. Khallaf, Ashraf Abdallah, Abed Al-Nasser Zoubi, Taisier Alnesafi, Awwad

【影响因子】3.889

【主题类别】

--

【Abstract】This study examines the use of blockchain technology in ESG reporting, with a focus on carbon emissions accounting within supply chains. Using a design science methodology, it develops a blockchain-based framework that integrates automated data collection, verification, and analysis. The framework enables precise tracking of carbon emissions, enhances compliance with ESG standards, and resolves key issues like data reliability and standardization. Results show improved reporting accuracy through immutable data records and automated verification processes. This advancement allows organizations to optimize decision-making, reduce carbon footprints, and achieve sustainability goals. The study contributes theoretically by introducing an innovative blockchain-integrated ESG reporting model and practically by offering a validated framework for companies to streamline carbon accountability and improve ESG compliance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; smart contracts; carbon accounting; supply chain; ESG reporting

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162410872

Impact Investing Innovation-From Impact 1.0 to 3.0

【Author】 Kaal, Wulf

【影响因子】3.889

【主题类别】

--

【Abstract】Impact innovation has progressed through three phases: 1.0, 2.0, and 3.0. Impact 1.0 introduced carbon credit trading, while Impact 2.0 added participatory grantmaking, impact measurement, and price competitions. Impact 3.0 incorporates Web3 community tools and impact certificate trading. This paper examines the evolution of these phases, focusing on Impact 3.0's influence on philanthropic practices. Through an analysis of the literature and case studies, Web3 technologies and impact certificate markets are investigated for how these innovations affect transparency and efficiency in social impact initiatives. The information gathered indicates that Impact 3.0 facilitates decentralized impact verification and creates a marketplace aligning stakeholder interests. Consequently, leveraging the features of Web3 technologies can enable philanthropy to scale significantly and provide insights for impact-focused donors aiming to improve outcomes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】social impact; ESG; impact certificates; carbon credits; decentralized autonomous organization; finance; token models; cryptocurrencies; feedback effects; emerging technology; tokens; blockchain; distributed ledger technology

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/su162411128

Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET

【Author】 Khatri, Narayan Lee, Sihyung Nam, Seung Yeob

【影响因子】3.847

【主题类别】

--

【Abstract】In this paper, we propose a Proof-of-Location (PoL)-based location verification scheme for mitigating Sybil attacks in vehicular ad hoc networks (VANETs). For this purpose, we employ smart contracts for storing the location information of the vehicles. This smart contract is maintained by Road Side Units (RSUs) and acts as a ground truth for verifying the position information of the neighboring vehicles. To avoid the storage of fake location information inside the smart contract, vehicles need to solve unique computational puzzles generated by the neighboring RSUs in a limited time frame whenever they need to report their location information. Assuming a vehicle has a single Central Processing Unit (CPU) and parallel processing is not allowed, it can solve a single computational puzzle in a given time period. With this approach, the vehicles with multiple fake identities are prevented from solving multiple puzzles at a time. In this way, we can mitigate a Sybil attack and avoid the storage of fake location information in a smart contract table. Furthermore, the RSUs maintain a dedicated blockchain for storing the location information of neighboring vehicles. They take part in mining for the purpose of storing the smart contract table in the blockchain. This scheme guarantees the privacy of the vehicles, which is achieved with the help of a PoL privacy preservation mechanism. The verifier can verify the locations of the vehicles without revealing their privacy. Experimental results show that the proposed mechanism is effective in mitigating Sybil attacks in VANET. According to the experiment results, our proposed scheme provides a lower fake location registration probability, i.e., lower than 10%, compared to other existing approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】VANET; proof-of-location (PoL); sybil attack; privacy; smart contract; blockchain

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/s24248140

Empowering Privacy Through Peer-Supervised Self-Sovereign Identity: Integrating Zero-Knowledge Proofs, Blockchain Oversight, and Peer Review Mechanism

【Author】 Liu, Junliang Liang, Zhiyao Lyu, Qiuyun

【影响因子】3.847

【主题类别】

--

【Abstract】Frequent user data breaches and misuse incidents highlight the flaws in current identity management systems. This study proposes a blockchain-based, peer-supervised self-sovereign identity (SSI) generation and privacy protection technology. Our approach creates unique digital identities on the blockchain, enabling secure cross-domain recognition and data sharing and satisfying the essential users' requirements for SSI. Compared to existing SSI solutions, our approach has the practical advantages of less implementation cost, ease of users' understanding and agreement, and better possibility of being soon adopted by current society and legal systems. The key innovative technical features include (1) using a zero-knowledge proof technology to ensure data remain "usable but invisible", mitigating data breach risks; (2) introducing a peer review mechanism among service providers to prevent excessive data requests and misuse; and (3) implementing a comprehensive multi-party supervision system to audit all involved parties and prevent misconduct.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data security; privacy protection; self-sovereign identity (SSI); blockchain; zero-knowledge proof; chameleon hash

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/s24248136

A study on the impact of enterprise digital transformation on informed trading

【Author】 Wang, Hualing

【影响因子】3.752

【主题类别】

--

【Abstract】Informed trading, driven by information asymmetry and market imperfections, varies in presence across markets. This form of trading not only distorts market transaction prices and hinders resource allocation but also initiates adverse selection transactions, increasing liquidity risks and potentially precipitating market crashes, thereby impeding the market's healthy development. Utilizing information asymmetry theory and principal-agent theory, this paper analyzes data from A-share listed companies from 2011 to 2022. Employing a fixed-effect model, it empirically examines the influence of enterprise digital transformation on the likelihood of informed trading. The findings demonstrate that enterprise digital transformation markedly reduces the likelihood of informed trading. Further analysis of heterogeneity indicates that, compared to state-owned, non-high-tech enterprises and enterprises in the western region, the inhibitory effect on informed trading is more pronounced in non-state-owned, high-tech enterprises and enterprises in the eastern and central regions. Additionally, the chain mediation effect underscores that digital transformation weakens information asymmetry and strengthens internal controls, thereby reducing informed trading. Finally, employing a dynamic panel threshold model we find that digital transformation can only significantly inhibit the informed transactions when enterprises have reached a certain level of technological and asset accumulation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1371/journal.pone.0313623

Identifying the barriers and enablers of blockchain adoption in Saudi Arabian last-mile logistics using principal component analysis

【Author】 Mohammed, Awsan Khan, Nokhaiz Tariq Alkerishan, Omar Ghaithan, Ahmed

【影响因子】3.745

【主题类别】

--

【Abstract】Last-mile logistics has emerged as a tool for responsiveness, however, requires dynamic business models and technology to integrate all the stakeholders. Blockchain is emerging as a platform for logistics and supply chain problems due to its prospective features, however, the adoption is slow due to unclear benefits and diverse challenges it brings. This study explores the relationship between last-mile logistics practices (LMLPs), blockchain adoption challenges, blockchain features and blockchain adoption benefits. Data are collected and principal component analysis is used to rank the practices. Finally, we measure the impact of blockchain benefits on LMLPs using regression analysis. The findings revealed that the most important practice is close partnership with customers, followed by a state-of-the-art cybersecurity system. Blockchain features such as transparency, real-time tracking, data-driven decision-making and secure information exchange offer key benefits, including lead-time reduction and enhanced flexibility in supply chains. However, policy uncertainty remains a major challenge to blockchain adoption.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Last-mile logistics practices; blockchain; supply chain; principal component analysis

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/09537325.2024.2448155

A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts

【Author】 Rani, Deepti Gill, Nasib Singh Gulia, Preeti Yahya, Mohammad Ahanger, Tariq Ahamed Hassan, Mohamed M. Abdallah, Fethi Ben Shukla, Piyush Kumar

CCF-C

【影响因子】3.488

【主题类别】

--

【Abstract】Digital evidence processing can be more critical in the heterogeneous Internet-of-Things (IoT) paradigm due to the lack of transparency, trust, integrity, and immutability. Researchers have conducted a substantial range of research over the past few decades to improve the digital chain of custody and forensic investigation. In a digital forensic investigation, preserving the digital evidence chain of custody with end-to-end security, integrity, privacy, traceability, access control, provenance, transparency, and evidence verification presents several challenges. The present paper proposes a blockchain-based model for a smart IoT environment to address these challenges. The primary goal of this study is to ensure the integrity, confidentiality, trust, and privacy of vital digital evidence throughout the forensic investigation. We only insert or delete digital evidence after verifying the user's authentication. We have utilized a consortium blockchain-based secure system that harnesses the benefits of an interplanetary file system (IPFS) to enhance the security and integrity of digital evidence management and chain-of-custody. The proposed mechanism can achieve security, integrity, access control, immutability, and trust for a digital chain-of-custody. The integration of the Ethereum blockchain-based test network and IPFS facilitates the development, testing, and deployment of decentralized applications (dApps) with enhanced security, efficiency, and decentralization. We deployed smart contracts on Metamask and tested them on the Sepolia test network. The Ethereum network records different gas fees and transaction fees based on various timestamps, gas prices, and traffic. In different numbers and timestamps, gas prices vary between 2.50000001 Gwei and 13.559962651 Gwei. Compared to many other transactions, the reduction ranges from 10 to 20%. The proposed model provides the highest throughput, approximately 5% more transactions per second, as well as the lowest latency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital evidence management; Inter-Planetary File System (IPFS); Blockchain; Ethereum; Smart contracts; MetaMask; IoT security

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s12083-024-01855-z

BBAD: Blockchain-based data assured deletion and access control system for IoT

【Author】 Meng, Yuxuan Wang, Baosheng Xing, Qianqian Wang, Xiaofeng Liu, Jian Xu, Xinyue

CCF-C

【影响因子】3.488

【主题类别】

--

【Abstract】The massive data generated by the Internet of Things (IoT) is often outsourced to the cloud, leading to a separation between data ownership and management. Access control during the data's validity period and assured deletion once that period expires are both crucial for protecting privacy. While recent research has primarily focused on access control, assured deletion has received less attention. Existing assured deletion schemes can be classified into key-control based and cryptographic policy based methods, but to varying degrees, they have limitations such as requiring a trusted third party, high encryption overhead, lack of support for deletion verification and fine-grained access control. To address these limitations, we propose BBAD, a blockchain-based assured deletion scheme that leverages smart contracts for fine-grained access control, employs Shamir secret sharing and re-encryption for assured key deletion, and utilizes Merkle Hash Tree (MHT) for public deletion verification. Notably, BBAD eliminates the need for a trusted third party, exhibits low computational overhead, supports customizable deletion time limit, and enables offline verification of deletion for users. Our experimental comparison with two prominent alternatives, Secure Electronic-Document Self-Destructing with Identity-Based Timed-Release Encryption (ESITE) and Key-Policy Attribute-Based Encryption for Assured Deletion (AD-KP-ABE), demonstrates that BBAD reduces data processing time by over 46.5%, data deletion time by 98.4%, and deletion verification time by 99.0%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; Smart contract; Secret sharing; Merkle hash tree

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s12083-024-01881-x

Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration

【Author】 Dhinakaran, D. Ramani, R. Raja, S. Edwin Selvaraj, D.

CCF-C

【影响因子】3.488

【主题类别】

--

【Abstract】Data security in electronic health records (EHR) remains a critical concern, with existing methods employing session, service, feature, rule, and profile-based encryption and access restriction models. However, these methods often fall short in achieving optimal security performance, leading to diminished trust among data owners. To address this challenge, we propose an Adaptive Feature-Centric Polynomial Data Security Model (AFPDSM) capable of efficiently enforcing security measures on diverse datasets. Based on data taxonomy analysis, the AFPDSM divides EHR data aspects into discrete groups according to their significance. The technique adapts the ciphertext produced by polynomial functions for data encryption and creates a blockchain based on feature values. Additionally, the model implements a Healthy Trust Access Restriction scheme to prevent malicious access. Adoption of the AFPDSM can result in up to 98% improvement in security performance and up to 97% improvement in access restriction performance. When compared to existing methods like HCA-ECC, EHRCHAIN, IBE-DLM, and SPAKE, our approach showcases significant improvements. Specifically, we observed a remarkable 98% enhancement in throughput. Additionally, our method exhibits reduced computational complexity, with an average encryption time of 101 ms and an average decryption time of 104 ms. Moreover, the network overhead is notably reduced by 21% compared to conventional methods. These findings underscore the superior performance and efficiency of our proposed approach in handling electronic health records (EHRs).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Block chain; Polynomial encryption; AFPDSM; Data encryption; Data security; Access restriction

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s12083-024-01883-9

Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications

【Author】 Singh, Aparna Rathee, Geetanjali

CCF-C

【影响因子】3.488

【主题类别】

--

【Abstract】The ability to share Electronic Health Records (EHRs) with the right people plays a crucial role in providing on-time diagnosis. The outsourcing of private health data on the cloud, with negligible control in the hands of the data owners, poses a significant challenge for e-healthcare applications. Obtaining the owner's consent is not just essential for data sharing but also to protect the privacy of the data being shared. With the help of Blockchain and Interplanetary File System (IPFS), this research paper proposes a purpose-based framework for obtaining dynamic consent before sharing data among healthcare providers, academicians, etc. The study develops a blockchain system on the Ethereum network to store encrypted EHRs on IPFS. This architecture allows for secure and privacy-enhanced data sharing. The proposed model demonstrates effectiveness in enhancing data security, privacy, scalability, ownership, and integrity of medical records. The cost analysis shows a negligible contract deployment cost of 0.00174363 ETH, equivalent to $2.78. The framework presents a viable solution for securing EHRs and obtaining dynamic consent, ensuring improved healthcare data management. The use of blockchain and IPFS offers a promising avenue for enhancing data security and privacy in e-healthcare applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Consent model; Data sharing; Access control; IPFS; Ethereum; E-healthcare mechanism

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s12083-024-01827-3

Blockchain-Based Central Bank Digital Currency: Empowering Centralized Oversight With Decentralized Transactions

【Author】 Tunzina, Tayrin Chayon, Md Asif Karim Jitu, Pritam Gupta Ankon, Mosammed Upnan Joy, Sheikh Nahiduzzaman Shaha, Redoy Kumar Islam, Md. Motaharul Hussain, Muhammad Shakhawat Hassan, Mohammad Mehedi Pham, Phuoc Hung

【影响因子】3.476

【主题类别】

--

【Abstract】The advent of Central Bank Digital Currencies (CBDCs) represents a significant evolution in monetary systems, enhancing transparency, efficiency, and resilience in financial transactions. This research presents a comprehensive CBDC framework that integrates centralized databases with decentralized blockchain technology, aimed at strengthening monetary oversight and tackling challenges such as money laundering and financial irregularities. By employing blockchain's immutable ledger, the proposed system supports secure and transparent digital transactions, thereby fostering trust and accountability in the financial ecosystem. Furthermore, the framework promotes financial inclusion by offering various transaction methods, such as internet-based payments, smart cards, and offline One-Time Password (OTP) systems. This diverse approach helps users in areas with limited internet access, effectively bridging critical gaps in digital accessibility and ensuring that everyone can participate in the digital economy. Through prototype development and empirical evaluation using tools like Ethereum, Geth, and web3.js, the study explores CBDC's potential for sustainable economic development, offering insights into practical applications and future scalability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Security; Online banking; Stability criteria; Ecosystems; Costs; Prototypes; Gold; Databases; Cryptocurrency; Central bank digital currency; and blockchain; and digital currency; and P2P payments; and KYC; and consensus; and ethereum; and smart contracts

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1109/ACCESS.2024.3517147

Marketplace, wholesale or hybrid: considering the role of blockchain implementation in countering consumer mistrust

【Author】 Ma, Deqing Shao, Wenbo Zhang, Kaiyue Hu, Jinsong

【影响因子】3.462

【主题类别】

--

【Abstract】Frequent exposure of fraud in online retailing has created consumer distrust in platforms and constrained the sustainability platform-based supply chains. We consider the role of blockchain in countering consumer mistrust and explore its impact on the platform sales modes selection (marketplace, wholesale, and hybrid) in a platform-based supply chain. Six game theoretic models where the platform takes three different sales modes (wholesale, marketplace, or hybrid) without and with blockchain adoption are developed. Intuition suggests that consumer mistrust reduces profits for the manufacturer and the platform. Counter-intuitively, there is little impact on the selection of platform sales modes. Moreover, as with previous studies where blockchain was not implemented, the manufacturer and the platform make an agreement on the wholesale (hybrid) mode when the commission rate and service effort are lower (higher) after implementing blockchain. The difference is that as the blockchain cost increases, the hybrid mode will no longer be selected.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Online retail platform; Blockchain technology; Sales modes; Consumer mistrust

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10660-024-09941-3

Dynamic connectedness, hedge and safe-haven effects: cryptocurrencies, precious metals and African stock markets

【Author】 Korsah, David Mensah, Lord Osei, Kofi Achampong Amewu, Godfred

【影响因子】3.422

【主题类别】

--

【Abstract】PurposeThis study seeks to: (1) examine the extent of interconnectedness prevailing between the cryptocurrency market, the stock market and the precious metals market. (2) Conduct thorough assessment of hedge and safe-haven qualities of broad range of precious metals and cryptocurrencies against returns on the African stock market.Design/methodology/approachThis study applied two novel approaches that is Cross-quantilogram, an advanced statistical technique used to examine the relationship between quantiles of response variable and the quantiles of predictor variables, and TVP-VAR, a technique that captures the dynamic connectedness of variables under consideration.FindingsIt was found that the three markets are highly interconnected, particularly among assets under the respective financial markets. It was further revealed that the Johannesburg Stock Exchange (JSE) was the most resilient stock market, whereas Bitcoin, BNB, Silver (XAG) and Platinum (XPT) also exhibited notable resistance to shocks. Finally, the study found that cryptocurrencies and precious metals portrayed varying hedge and safe haven qualities under the various stock markets.Practical implicationsThe high interdependency between the African stock market, cryptocurrencies and precious metals suggests that none of the markets is immune to shocks form the other market. The finding that cryptocurrencies and precious metals exhibit some degree of safe-haven and hedge potentials, albeit limited in certain stock markets, provides investors with alternative investment options during market downturns. Since most African stock markets, except the JSE, are net receivers of shocks, investors in these markets should exercise caution during periods of global financial uncertainty.Originality/valueTo the best of our knowledge, this study is the first to explore the dynamic interconnectedness between seven carefully selected African stock markets, three distinct cryptocurrencies and four precious metals, while also assessing the hedge and safe-haven potential of the cryptocurrencies and precious metals against stock market returns. Additionally, the study stands out in recent literature by employing two novel approaches: the TVP-VAR model, which captures the dynamic connectedness among variables, and the Cross-Quantilogram, an advanced statistical method that analyzes the relationship between the quantiles of the response and predictor variables, all within a single study.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Hedge; Cryptocurrencies; Safe-haven; Precious metals; Dynamic connectedness; African stock market

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1108/IJOEM-06-2024-1090

Healthcare Data Security and Privacy Protection Framework Based on Dual Channel Blockchain

【Author】 Kaur, Jasleen Rani, Rinkle Kalra, Nidhi

【影响因子】3.310

【主题类别】

--

【Abstract】The integration of blockchain technology with healthcare digitalization has the potential to improve data management, reduce administrative costs, increase data security and privacy, and enhance querying capabilities. However, in the traditional blockchain model, all data and transactions are processed and stored in a single, unified ledger, and all participants have access to the same data, which raises privacy concerns and poses congestion issues with an increased number of transactions. It becomes even more problematic in healthcare, where data confidentiality is essential. In literature, centralized storage utilizing cloud-based solutions is employed to manage large volumes of data, restricting information sharing beyond the institution. Additionally, the direct storage of massive data on the blockchain impacts the performance and scalability of the system. In this paper, to address these issues and ensure the security and rapid retrieval of healthcare information, a framework is proposed, which involves the implementation of a dual-channel blockchain architecture combined with two robust cryptographic algorithms, i.e., Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES). These encryption techniques deliver safe data transmission via RSA and efficient data storage via AES, offering a secure mechanism to prevent unauthorized access and data breaches. In addition, private data collection is incorporated to securely store confidential patient information, guaranteeing privacy, security, and limited access. Also, an Access Control List (ACL) is defined for different users to implement access permissions, i.e., grant and revoke access to viewers while sharing information. Moreover, an off-chain storage InterPlanetary File System (IPFS) is used to improve scalability. The performance evaluation is performed by conducting experimental simulations, where critical performance indicators such as throughput and latency are measured across different transaction rates, channels, and rate controllers. Moreover, the proposed framework classifies smart contract functions into query and invoke/write transactions, enhancing the efficiency of data retrieval. Further, the functionality and security analysis of the proposed framework is discussed. The results demonstrate that the proposed approach is highly capable of preserving security and privacy standards while also assuring efficient management and accessibility of data in healthcare applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】AES encryption; blockchain; data security; private data collections; RSA encryption

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1002/ett.70049

Channel mode selection and blockchain strategy for a capital-constrained manufacturer

【Author】 Chen, Kebing Xu, Liwei Wang, Shengbin Lei, Dong

【影响因子】3.051

【主题类别】

--

【Abstract】We study the optimal channel selection and blockchain strategy of a capital-constrained manufacturer who sells the green product through an online platform. Blockchain technology (BCT) can be used by the manufacturer to increase consumer confidence in the value of green product. We first show that the manufacturer's financing strategy is characterized by two thresholds that depend on the manufacturer's channel selection and blockchain strategy. BCT increases wholesale and retail prices, but it does not always increase product greenness and demand. We find that the manufacturer's ability to bear the blockchain cost correlates with his financial standing as well as the platform's operation mode. Furthermore, we show that the agency mode should be selected by the manufacturer only when the commission rate falls below a specified threshold. We also examine the impact of commission rate on the platform's operational strategy and channel consistency. Furthermore, under the agency model, we show that there is always a "win-win" situation in green cost-sharing cooperation regardless of the manufacturer's financial state. However, such a "win-win" situation only exists in financing circumstances under the reselling mode. Finally, the extended model explores the relationship between channel strategies and risk preferences of the manufacturer under demand uncertainty.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Supply chain management; blockchain technology; finance; E-platform; game theory; optimization

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/01605682.2024.2445756

Scalable transactional relationship protection based on minimized replications for permissioned blockchain

【Author】 Li, Wenquan Min, Xinping Kong, Lanju Li, Qingzhong

【影响因子】3.000

【主题类别】

--

【Abstract】The permissioned blockchain is one of the core technologies for Web3.0. However, the transactional relationship leakage on blockchain has become a critical threat to the benefits of users. To prevent the malicious analysis of the sending and receiving addresses of series of transactions, much effort has recently been put into transactional relationship protection (TRP) in blockchain by academia and industry. However, most of the current TRP methods are designed for the particular fungible cryptocurrencies, which have limitations in terms of asset types and scenarios. This paper proposes a TRP-enabled permissioned blockchain framework. First, the framework introduces a ledger structure comprising two distinct types of blocks. The basic block publicly contains the verifiable structure of the transactions, while the transaction block privately contains their content in selected committee. Second, to prevent the committee from analysing the relationships in transaction blocks, the framework includes a confidential transaction replication mechanism that splits the related transactions and replicates them to different committees. Furthermore, we optimize the framework via quantitative analysis to minimize the required replicating size of per transaction, thus enabling the framework to achieve enhanced privacy and scalability. Theoretical analysis and experimental results on datasets demonstrate that the framework achieves more than 95% probabilities of hiding the relationships, and maintains 10 times the throughput compared to the blockchain without our method.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Partial replication; Transactional relationship; Privacy; Scalability

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s11280-024-01326-8

Dual-Channel Supply Chain Pricing Coordination and Channel Selection with Reference Quality Effect Under Blockchain Traceability

【Author】 He, Quanfeng Zhang, Tianrui Wang, Jiangtao Li, Jingxuan

【影响因子】2.940

【主题类别】

--

【Abstract】This paper uses symmetry to develop a dual-channel supply chain network model, both with and without blockchain technology, ensuring that the solutions for pricing and channel selection are symmetric in both modes. And, in the model that does not employ blockchain technology, mechanisms are used to make the benefits of centralized and decentralized decision-making symmetrical. Consumers often have varied psychological expectations when choosing products. This paper considers the reference quality effect, where consumers establish a reference quality before making a purchase decision. However, the lack of transparency in product sales across supply chain channels can lead to a disparity between actual and expected product quality, impacting market demand and brand reputation. Therefore, manufacturers must balance increasing profits with meeting consumer demand for product traceability. This paper focuses on a dual-channel supply chain model involving manufacturers, retailers, and consumers. Firstly, the pricing issues and channel selections under centralized decision-making and a Stackelberg game with decentralized decision-making are comparatively analyzed in the mode of without adopting blockchain technology and adopt two-part pricing contract to coordinate. Secondly, the impact of blockchain technology on pricing is examined when it is adopted. Thirdly, pricing issues and channel selection strategies based on actual product quality in the dual-channel supply chain are compared under both models. Finally, numerical simulations validate the findings. The study found that: (1) the reference quality effect has a cross-positive influence on the equilibrium price and profit of a dual-channel supply chain; (2) the two-part pricing contract can mitigate the double-marginal effect and enhance profits; and (3) the adoption of the blockchain technology leads to increased equilibrium prices and total profits in the dual-channel supply chain compared to not using it. This paper offers a theoretical foundation for manufacturers and retailers to develop effective pricing and channel selection strategies in dual-channel operations to achieve higher returns.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】dual-channel supply chain; blockchain; reference quality effect; pricing and coordination; two-part pricing contract; channel selection

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/sym16121650

Investment Decision and Coordination of Fresh Supply Chain Blockchain Technology Considering Consumer Preference

【Author】 Xing, Xiaohu Miao, Renzhi

【影响因子】2.895

【主题类别】

--

【Abstract】In this paper, we study the decision-making and coordination problem of a two-tier fresh food supply chain consisting of a supplier and a retailer. Considering the influencing factors of consumers' information preference, freshness, and misrepresentation, we construct a centralized decision-making model and a decentralized decision-making Stackelberg game model. We also analyze the changes in the equilibrium solution of the supply chain before and after the input of blockchain technology, identify the conditions for the investment in blockchain technology, and design a "cost-sharing + benefit-sharing" combination contract for the coordination of the blockchain. The results are as follows: Firstly, under decentralized decision-making, if the fresh supplier misreports the freshness of the product, it will mislead the retailer to increase the order quantity, and its own profit will rise. Therefore, the fresh supplier has the motivation to misreport freshness. However, the backlog of fresh products will eventually damage the retailer's profit, and the overall profit of the supply chain will also be damaged. Therefore, the increase in the profit of the fresh supplier is at the expense of the overall interests and stability of the supply chain. Second, when the investment cost of blockchain technology is within a certain threshold, it is feasible to invest in blockchain technology. Consumers' preference for traceable fresh products will encourage the fresh supply chain to improve the level of information traceability and increase investment in blockchain technology. Finally, there are double marginal effects in the fresh supply chain under decentralized decision-making. The combined contract of "cost-sharing + revenue-sharing" can coordinate the overall revenue of the supply chain to the level of centralized decision-making. When the contract parameters meet certain conditions, Pareto improvement in revenue can be achieved for all parties involved in the fresh supply chain. The willingness of retailers to invest in blockchain technology will change with the change in contract parameters. When the proportion of retailers' costs and the proportion of shared income are higher, the level of retailers' investment in blockchain technology will decrease. Therefore, the interests of supply chain members need to be balanced in the process of contract coordination.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】fresh supply chain; consumer preference; blockchain technology investment

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/systems12120522

A proposed zakat model for digital assets from the Shariah perspective

【Author】 Rosele, Muhammad Ikhlas Muneem, Abdul Ali, Abdul Karim Che Seman, Azizi Haji Abdullah, Luqman Abdul Rahman, Noor Naemah Abd Sukor, Mohd Edil

【影响因子】2.853

【主题类别】

--

【Abstract】PurposeThe purpose of this study is to propose and develop a zakat model for digital assets from the Shari'ah perspective.Design/methodology/approachThis research adopts a qualitative research method while studying the literature thoroughly, and it analyzes the data through an exploratory research approach to propose a zakat model for the digital assets.FindingsThis research aims to develop a zakat model for digital assets within the framework of Shari'ah. Using a qualitative research method, the study thoroughly examines existing literature and uses an exploratory research approach to propose this zakat model. The findings suggest that digital assets hold the potential to be considered for zakat in the contemporary digital age. Previous studies indicate that both commodity-based and currency-based digital assets meet the criteria for zakat imposition. Given zakat's significant impact on socioeconomic development, it is imperative to carefully manage these assets to maximize their potential benefits. However, variations in interpretations by different jurisdictions and Shari'ah scholars regarding the understanding and classification of digital assets lead to ongoing scrutiny from legal and religious perspectives. This research aims to contribute to the discourse by proposing a zakat model for digital assets and identifying potential assets eligible for zakat.Originality/valueThis research seems to be the pioneer in providing a zakat model for digital assets, combining different segments of digital assets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital assets; Digital tokens; Digital currency; Cryptocurrency; Zakat; Model; Shariah

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1108/IMEFM-08-2024-0408

Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

【Author】 Sevin, Abdullah Mohammed, Abdu Ahmed Osman

【影响因子】2.838

【主题类别】

--

【Abstract】Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. Initially prominent in cryptocurrencies such as Bitcoin, its applications have expanded into areas such as the Internet of Things. However, integrating blockchain into IoT systems is challenging due to the limited computing and storage capabilities of IoT devices. Efficient blockchain mining requires lightweight hash functions that balance computational complexity with resource constraints. In this study, we employed a structured methodology to evaluate hash functions for blockchain-IoT systems. Initially, a survey is conducted to identify the most commonly used hash functions in such environments. Also, this study identifies and evaluates a lightweight hash function, designated as HashLEA, for integration within blockchain-based IoT systems. Subsequently, these functions are implemented and evaluated using software coded in C and Node.js, thereby ensuring compatibility and practical applicability. Performance metrics, including software efficiency, hardware implementation, energy consumption, and security assessments, were conducted and analyzed. Ultimately, the most suitable hash functions, including HashLEA for blockchain-IoT applications, are discussed, striking a balance between computational efficiency and robust cryptographic properties. Also, the HashLEA hash function is implemented on a Raspberry Pi 4 with an ARM processor to assess its performance in a real-world blockchain-IoT environment. HashLEA successfully passes security tests, achieving a near-ideal avalanche effect, uniform hash distribution, and low standard deviation. It has been shown to demonstrate superior execution time performance, processing 100 KB messages in 0.157 ms and 10 MB messages in 15.48 ms, which represents a significant improvement in execution time over other alternatives such as Scrypt, X11, and Skein.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; internet of things; hash function; security tests; performance analysis

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/app142411967

User Real Comments Incentive Mechanism Based on Blockchain in E-Commerce Transactions-A Tripartite Evolutionary Game Analysis

【Author】 Le, Chengyi Zheng, Ran Lu, Ting Chen, Yu

【影响因子】2.738

【主题类别】

--

【Abstract】In response to the widespread issue of fake comments on e-commerce platforms, this study aims to analyze and propose a blockchain-based solution to incentivize authentic user feedback and reduce the prevalence of fraudulent reviews. Specifically, this paper constructs a tripartite evolutionary game model between sellers, buyers, and e-commerce platforms to study the real comment mechanism of blockchain. The strategy evolution under different incentive factors is simulated using replication dynamic equation analysis and Matlab software simulation. The study found that introducing smart contracts and "tokens" for incentives not only increased incentives for real comments but also reduced the negative experiences caused by "speculative" sellers, thereby influencing buyers to opt for authentic reviews. By structuring interactions through blockchain, the mechanism helped lower informational entropy thus reducing disorder and unpredictability in buyer and seller behavior and contributing to system stability. Further, by increasing penalties for dishonest behavior under the "credit on the chain" system, the platform lowered entropy in the system by promoting trust and reducing fraudulent activities. The real comment mechanism based on blockchain proposed in this paper can effectively enhance the order and transparency within the comment ecosystem. These findings contribute to theory and practice by providing strategic insights for e-commerce platforms to encourage genuine feedback, reduce informational entropy, and mitigate fake comments, ultimately fostering a more reliable online marketplace.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; e-commerce transactions; real comments; smart contracts; tripartite evolution game

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/e26121005

Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing

【Author】 Ganesh, N. S. Gowri Balasubramanian, V. Prasad, D. Venkata Vara Velan, S. Senthil

CCF-C

【影响因子】2.701

【主题类别】

--

【Abstract】Mobile Edge Computing (MEC) integrates edge technologies and provides consumers with low-latency storage and efficient computing services. MEC is an approach that delivers services from the cloud at the network edge and is rapidly evolving. Internet of Things (IoT) devices can run their applications in real-time with minimal latency via MEC. However, task offloading is subject to privacy and security breaches such as data replication, confidential information leaking, and data tampering. Edge technology can provide enhanced security for data transmission and storage, enabling tamper-proof and transparency for IoT, when combined with blockchain. However, the effectiveness of data issue detection in the earlier schemes is relatively low, making the present information storage methods unsuitable for processing the obtained data in blockchain-assisted edge processing. The utilization of resources based on network, storage, processing, and privacy can be further enhanced through the Integration of Blockchain and Edge computing (IBEC). To tackle the privacy issues regarding task offloading, a blockchain-integrated secure data storage scheme is implemented in this paper. The data has to be stored that are collected from various IoT devices. The authentication of the user whoever tries to store that data, is verified with the help of the Adaptive Multiscale Dilated Bidirectional Long Short Term Memory (AMDBi-LSTM) model. This approach leverages the strength of Bi-LSTM to permit authorized people to access the data and enhance the security of the data. Moreover, adding dilation in the developed model can easily identify the authorized user sensitive data without the need for multiple steps and the multiscale helps to increase the security of storing the data. By combining these techniques, the developed AMDBi-LSTM model aids in enhancing the speed of detecting the data issue as much as earlier than the conventional models. The hyper-parameters in the AMDBi-LSTM are optimized using the Improved Nuclear Reaction Optimization (INRO) algorithm. Optimizing the parameters in the proposed model using the INRO algorithm helps to verify the authenticity of data, enhance the offloading task in MEC, and also reduce the data breach in the existing models. Once the confidentiality of the user is verified, then the data are considered for the encryption phase. The combination of Hybrid Attribute-Based Encryption with Elliptical Curve Cryptography (HABE-ECC) is used to encrypt the data. The integration of Attribute-Based Encryption (ABE) and Elliptical Curve Cryptography (ECC) has the ability to perform secure data transmission with the help of optimal key generation. Additionally, it consumes low power and memory during the process of encryption. The keys needed to perform data encryption are generated with the help of the same INRO algorithm. The encrypted data is digitally signed by the authorized user, and it is stored in the blockchain. The optimal task offloading is also executed with the help of the INRO algorithm. The authorized user-based secure data storage and secure task offloading are also achieved with the support of blockchain technology. The security offered by this system is compared with other existing algorithms to showcase the improved security provided by this approach.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Secured data storage and optimal task offloading; Mobile edge computing; Adaptive multiscale dilated bidirectional long short term memory; Hybrid attribute-based encryption with the elliptical curve cryptography; Improved nuclear reaction optimization

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s11276-024-03886-z

Unleashing the Potential of Permissioned Blockchain: Addressing Privacy, Security, and Interoperability Concerns in Healthcare Data Management

【Author】 Hossain, Delowar Mamun, Quazi Islam, Rafiqul

【影响因子】2.690

【主题类别】

--

【Abstract】Blockchain technology leverages a cryptographic system to provide secure and immutable storage of transaction histories within a decentralised framework. While various industries have demonstrated interest in integrating blockchain into their IT systems, concerns regarding accessibility, privacy, performance, and scalability persist. Permissioned blockchain frameworks offer a viable solution for securing confidential records. Extensive research has been conducted to explore the opportunities, challenges, application areas, and performance evaluations of different public and permissioned blockchain platforms. Given the sensitive nature of medical information, healthcare organisations must adhere to various legal obligations, including HIPAA regulations, to protect these data. Although navigating these requirements can be challenging, it is crucial for safeguarding the reputation of healthcare providers, maintaining patient trust, and avoiding legal repercussions. Permissioned blockchains represent decentralised digital ledgers tailored to collaborate among businesses and organisations. Their popularity has increased significantly in recent years, resulting in the availability of several leading options, such as Hyperledger Fabric, Corda, Quorum, and MultiChain. Each of these platforms presents its own set of advantages and disadvantages. Although blockchain technology remains relatively nascent in the permissioned realm, several factors warrant consideration when comparing these platforms. This study will review the existing landscape of blockchain technologies in healthcare applications and identify the research scopes. This research aims to determine how permissioned blockchain technology can effectively fulfil the requirements for managing healthcare data.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】healthcare; Hyperledger; Corda; MultiChain; permissioned blockchain; Quorum

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/electronics13245050

The Role of Artificial Intelligence and Big Data Analytics in Shaping the Future of Professions in Industry 6.0: Perspectives from an Emerging Market

【Author】 Deliu, Delia Olariu, Andrei

【影响因子】2.690

【主题类别】

--

【Abstract】Digital technologies are fundamentally transforming professions by altering roles and redefining competencies across all sectors. The progression from computerization to digitization, digitalization, and now digital transformation has been driven by the widespread integration of artificial intelligence (AI) and big data analytics (BDA). Industry 4.0 introduced smart automation and connectivity, Industry 5.0 emphasized human-machine collaboration and personalization, and Industry 6.0 now integrates advanced technologies with sustainability and ethical considerations, exerting a profound influence on many professions. This transformation is especially significant in emerging markets, where AI and BDA are overhauling traditional practices and enhancing efficiency but also introducing new challenges. Focusing on the accounting profession, this paper examines AI's and BDA's dual impact on the roles and skill sets of professional accountants (PAs). Specifically, it addresses how these technologies shape the activities, interactions, roles, and competencies of PAs in an Industry 6.0 context, as well as the opportunities and challenges that arise. Given the public interest role of PAs in ensuring accuracy and transparency in financial reporting, understanding their perceptions and experiences of digital transformation is essential. The findings reveal that while AI and BDA drive efficiency gains and open strategic pathways, they also risk eroding core traditional accounting competencies, reducing client engagement, and raising ethical concerns such as data security and privacy-all of which can undermine service quality and, ultimately, public trust. These insights underscore the need for responsible AI and BDA integration, particularly in emerging markets, where digital literacy gaps and regulatory limitations may slow adoption. This study offers actionable recommendations for policymakers, educators, and organizations, highlighting the importance of ethical standards, targeted training, and sustainable practices to preserve the relevance and integrity of the accounting profession in an increasingly technology-driven era.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】digitalization; Industry 6.0; digital transformation; artificial intelligence; big data analytics; accounting; auditing; professional accountants; public interest; emerging market

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/electronics13244983

Detection of Ethereum Phishing Fraud Nodes Based on Feature Enhancement Strategy and GBM

【Author】 Liu, Sheng-Zheng Yu, Xin-Yue Li, Ya-Ting Zhang, Hao Guo, Xue-Pin Ma, Cui-Hua Long, Hai-Xia

【影响因子】2.690

【主题类别】

--

【Abstract】With the rapid development of blockchain technology and the popularity of cryptocurrency, phishing scams pose an increasingly severe threat to the security of cryptocurrency transactions. Existing fraud detection methods have not accurately identified phishing behaviors, especially failing to capture key neighbor information and its impact effectively. To address this problem, we proposed a phishing detection framework based on FAAN-GBM (Feature and Attention Augmented Network with Gradient Boosting Machine), which aims to improve phishing fraud detection effectiveness on the Ethereum platform by further refining the extraction of phishing account features. This framework integrates basic features, transaction features, and interaction features of nodes, optimizes feature aggregation through importance analysis and attention mechanism of neighbor node, and uses autoencoders to deepen the nonlinear expression of node features. Through extensive testing on real Ethereum datasets, FAAN-GBM has demonstrated superior performance over existing methods, effectively improving the identification accuracy of phishing fraud nodes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; Ethereum; phishing scam; feature enhancement; Gradient Boosting Machine

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/electronics13245060

Blockchain-Assisted Secure and Lightweight Authentication Scheme for Multi-Server Internet of Drones Environments

【Author】 Ju, Sieun Park, Hyewon Son, Seunghwan Kim, Hyungpyo Park, Youngho Park, Yohan

【影响因子】2.592

【主题类别】

--

【Abstract】Unmanned aerial vehicles (UAVs) have seen widespread adoption across diverse sectors, including agriculture, logistics, surveillance, and disaster management, due to their capabilities for real-time data acquisition and autonomous operations. The integration of UAVs with Internet of Things (IoT) systems further amplifies their functionality, enabling sophisticated applications such as smart city management and environmental monitoring. In this context, blockchain technology plays a pivotal role by providing a decentralized, tamper-resistant ledger that facilitates secure data exchange between UAVs and connected devices. Its transparent and immutable characteristics mitigate the risk of a single point of failure, thereby enhancing data integrity and bolstering trust within UAV-IoT communication networks. However, the interconnected nature of these systems introduces significant security challenges, including unauthorized access, data breaches, and a variety of network-based attacks. These issues are further compounded by the limited computational capabilities of IoT devices and the inherent vulnerabilities of wireless communication channels. Recently, a lightweight mutual authentication scheme using blockchain was presented; however, our analysis identified several critical security flaws in these existing protocols, such as drone impersonation and session key disclosure. To address these vulnerabilities, we propose a secure and lightweight authentication scheme for multi-server UAV-IoT environments. The proposed protocol effectively mitigates emerging security threats while maintaining low computational and communication overhead. We validate the security of our scheme using formal methods, including the Real-Or-Random (RoR) model and BAN logic. Comparative performance evaluations demonstrate that our protocol enhances security while also achieving efficiency, making it well-suited for resource-constrained IoT applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】UAV; IoT; IoD; blockchain; multi-server; authentication; RoR model; BAN logic

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.3390/math12243965

TBFL: blockchain-enabled trusted byzantine-robust federated learning framework for photovoltaic power generation forecasting

【Author】 Zhang, Yan Wang, Liangliang Luo, Yiyuan Zhang, Kai Long, Yu Chen, Kefei

【影响因子】1.762

【主题类别】

--

【Abstract】Precise forecasting of photovoltaic (PV) power generation upholds flexibility and reliability within the power grid. Due to the data security dilemma of previous forecasting methods, federated learning (FL) has been widely studied for its ability to train models without sharing training data. However, the incorrect behavior from untrusted devices and servers in traditional FL frameworks can undermine the integrity of the global model, precipitating inaccurate power generation forecasting. Therefore, we propose a blockchain-enabled trusted Byzantine-robust FL framework, called TBFL, designed for decentralized and privacy-preserving PV power generation forecasting. Specifically, this framework features a trusted supervision mechanism, which can effectively eliminate malicious gradients to achieve a high-quality model. In addition, a multilevel differential privacy scheme is designed to strike a balance between privacy protection and model accuracy. Finally, a model clipping algorithm based on neuronal similarity is implemented to optimize both the duration and consumption associated with local device training. Comprehensive experimental outcomes demonstrate that the framework TBFL can successfully improve robustness, and achieve similar efficiency as FedAvg while maintaining a high forecasting accuracy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1093/comjnl/bxae141

MAPBFT: multilevel adaptive PBFT algorithm based on discourse and reputation models

【Author】 Wen, Xin Yang, Xiaohui

【影响因子】1.762

【主题类别】

--

【Abstract】The traditional practical Byzantine fault tolerance (PBFT) consensus algorithm has limitations due to its failure to consider node credibility and its static structure, leading to reduced adaptability and increased communication overhead, particularly when dealing with Byzantine nodes. To address these issues, we propose a multilevel adaptive practical Byzantine fault tolerance algorithm (MAPBFT) based on PBFT and incorporating adaptive techniques, including a discourse power mechanism. MAPBFT initially uses a reputation model to evaluate node parameters such as past performance, reliability, availability, and response delay, providing predictive insights for the adaptive algorithm. The adaptive algorithm then employs a multi-layer perceptron to predict the reputation scores of nodes. This enables the selection of high-reputation nodes for consensus participation, narrowing the consensus scope, and reducing communication overhead. Finally, discourse power is distributed differentially based on node reputation scores. The consensus advancement criterion is modified to a threshold achieved through accumulated discourse power, focusing the system on high-reputation nodes and enhancing consensus efficiency and resistance against malicious nodes. We conducted experiments to validate MAPBFT's performance and compared it with PBFT and APBFT. Experimental results demonstrate that MAPBFT enhances throughput, reduces response delay and communication overhead, and improves security, outperforming the other protocols.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】PBFT; discourse power mechanisms; adaptive algorithms; reputation models; blockchain

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1093/comjnl/bxae137

Verifiable attribute-based multi-keyword ranked search scheme in blockchain

【Author】 Chen, Yang Zhao, Chunlu Pan, Jin Liu, Yang

【影响因子】1.762

【主题类别】

--

【Abstract】In recent years, cloud storage has gradually become a promising tool for providing data sharing and data storage services with privacy protection. However, to enable users to search over encrypted data and to enable data owners to perform fine-grained search authorization on their encrypted files is still a great challenge. Although attribute-based keyword search (ABKS) is a well-received solution to the challenge, the direct adoption of the traditional ABKS schemes in cloud storage suffers two issues. The first problem is the lack of integrity verification of search results. That is, the users cannot verify whether the server has actually performed a search without compromise. The second issue is that the retrieval modes of most ABKS schemes are not flexible enough. Aiming at the above two issues, a verifiable ABKS scheme is proposed herein. Besides, we proposed security definitions for two types of adversaries and proved that the proposed scheme is verifiable and able of resisting outside keyword guessing attack and chosen keyword attack. Finally, we carried out all-round simulations with actual data set, showing that the proposed scheme has advantage in efficiency over other similar schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】ABKS; verifiable; multi-keyword ranked search; blockchain; cloud storage

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1093/comjnl/bxae128

Concentrated Liquidity in Ethereum Blockchain's Digital Asset Trading: Insights from Innovative Back-Testing Algorithms

【Author】 Luo, Kai Jin, Nanlin Ma, Jieming

【影响因子】1.741

【主题类别】

--

【Abstract】Blockchain has started moving to Ethereum, decentralised and open-source. One of the most important application domains of the Ethereum blockchain is decentralised finance (DeFi). It facilitates speed-up trading, in absence of the traditional financial intermediaries, such as brokerages, exchanges, or banks. The three main types of digital asset trading strategies are concentrated liquidity, unbounded liquidity, and grid trading. Concentrated liquidity has recently been designed to increase the liquidity provision that indicates the convertibility of assets. Currently, the performance comparison of these three types of trading remains largely unclear. This research proposes back-testing algorithms to measure their return on investment (ROI). Our research has been conducted on real Ethereum blockchains and has discovered that their ROIs vary and depend on price fluctuation. These findings will shed new insights in the design of future decentralised trading strategies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Concentrated liquidity; Ethereum blockchain; Back-testing algorithm

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10614-024-10823-x

Memory Persistence in Minute Frequency Cryptocurrencies: Analysis Based on Hurst-Exponent and LSTM Brownian Diffusion Network

【Author】 Martinez-Farias, Francisco J. Martinez-Sanchez, Jose F. Lopez-Perez, Pablo A. Perez-Lechuga, Gilberto

【影响因子】1.741

【主题类别】

--

【Abstract】Ascertaining and characterizing trends in high and middle-frequency data periods is crucial and demanding. We studied every minute of available cryptocurrency data on Yahoo over a first period of three weeks, from May 15, 2023, to June 2, 2023, and a second period from May 19, 2024, to June 7, 2024. Cryptocurrencies were chosen since they have lower exchange volumes compared to other financial products. (1) Our analysis resulted in six groups per period of cryptocurrency time series accumulated returns through clustering. (2) We compute the Hurst exponent and its temporal evolution using a sliding window technique to measure the memory autoregressive trends in the time series. (3) Based on our findings, we employed the LSTM model on one of the components of each cluster to make a forecast and compare it with actual data. (4) Our research revealed that if the average Hurst exponent of a time series deviates from the stochastic regime, then the series is suitable for forecasting using the LSTM method. (5) We also developed an LSTM-Bm model that captures the time series' stochastic nature to describe the forecasting diffusion. (6) We empirically show an inverse relationship between the Hurts exponent and the relative error of memory-based forecasting.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Memory-persistence; Hurst exponent; Minute-frequency; Long-short-term-memory; Diffusion description

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10614-024-10831-x

Adversarial generation method for smart contract fuzz testing seeds guided by chain-based LLM

【Author】 Sun, Jiaze Yin, Zhiqiang Zhang, Hengshan Chen, Xiang Zheng, Wei

CCF-B

【影响因子】1.677

【主题类别】

--

【Abstract】With the rapid development of smart contract technology and the continuous expansion of blockchain application scenarios, the security issues of smart contracts have garnered significant attention. However, traditional fuzz testing typically relies on randomly generated initial seed sets. This random generation method fails to understand the semantics of smart contracts, resulting in insufficient seed coverage. Additionally, traditional fuzz testing often ignores the syntax and semantic constraints within smart contracts, leading to the generation of seeds that may not conform to the syntactic rules of the contracts and may even include logic that violates contract semantics, thereby reducing the efficiency of fuzz testing. To address these challenges, we propose a method for adversarial generation for smart contract fuzz testing seeds guided by Chain-Based LLM, leveraging the deep semantic understanding capabilities of LLM to assist in seed set generation. Firstly, we propose a method that utilizes Chain-Based prompts to request LLM to generate fuzz testing seeds, breaking down the LLM tasks into multiple steps to gradually guide the LLM in generating high-coverage seed sets. Secondly, by establishing adversarial roles for the LLM, we guide the LLM to autonomously generate and optimize seed sets, producing high-coverage initial seed sets for the program under test. To evaluate the effectiveness of the proposed method, 2308 smart contracts were crawled from Etherscan for experimental purposes. Results indicate that using Chain-Based prompts to request LLM to generate fuzz testing seed sets improved instruction coverage by 2.94% compared to single-step requests. The method of generating seed sets by establishing adversarial roles for the LLM reduced the time to reach maximum instruction coverage from 60 s to approximately 30 s compared to single-role methods. Additionally, the seed sets generated by the proposed method can directly trigger simple types of vulnerabilities (e.g., timestamp dependency and block number dependency vulnerabilities), with instruction coverage improvements of 3.8% and 4.1%, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fuzz testing; Smart contracts; LLM; Seed set generation; Prompts

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1007/s10515-024-00483-4

Centralized decentralization simple economics of the DPoS blockchain governance

【Author】 Jeong, Seungwon (Eugene)

【影响因子】1.287

【主题类别】

--

【Abstract】In the Delegated Proof-of-Stake blockchain, block producers (BP) are elected by stake-weighted vote. The supermajority of BPs can change the rule of the blockchain; thus, preventing the centralization of votes is important. We find the optimal number of votes per account (VPA) that minimizes takeover risks while maximizing voting flexibility. A smaller VPA requires more stake for takeover, but only up to a certain point, implying that the 'one vote per account' rule adopted by some major blockchains to mitigate centralization may be unnecessary. Our results are applicable to any environments in which multiple decision makers are elected by voting.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Takeover; governance; voting; cryptocurrency; consensus mechanism

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/13504851.2024.2445074

How does investor sentiment affect the Korean premium in the Bitcoin market?

【Author】 Chae, Joon Bae, Kyounghun Kang, Hyoung-Goo Koo, Bonha

【影响因子】0.925

【主题类别】

--

【Abstract】We examine how investor emotions and Bitcoin price influence each other using intraday data and textual analysis. We extract emotions from a popular online chatting window at one of the largest cryptocurrency exchanges in Korea. To control for global factors, we analyse relative Bitcoin prices and the differences between the Korean exchange and other global prices. The identified emotions predict the return and volatility of Bitcoin price one hour ahead. The results are economically significant: simple arbitrage trading strategies using the relationship between emotions and Bitcoin prices generate profits. Consequently, investor emotions drive Bitcoin prices, suggesting irrational crypto-markets that rational speculators may exploit.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Investor Sentiment; Online Chatting; Textual Analysis; Multi-Class Emotions; G7; G10

【发表时间】2024

【收录时间】2025-02-07

【文献类型】

【DOI】 10.1080/10293523.2024.2417331

Building Better Defence: Overcoming Challenges in Product Development through Supplier Integration in India

【Author】 Singh, Ashish Kaushik, Neeraj Pandey, Prashant Kumar

【影响因子】0.555

【主题类别】

--

【Abstract】This study investigates supplier integration challenges and strategies in Indian defence product development, employing stakeholder theory, resource-based view, and relational view as theoretical lenses. Through qualitative analysis of semistructured interviews with key stakeholders, we identify critical barriers including information security concerns, regulatory complexities, and inadequate domestic technological capabilities. Conversely, collaborative platforms, streamlined procurement, and R&D incentives emerge as potential enablers. The findings reveal a complex interplay between national security imperatives and the need for innovation, highlighting the unique context of the defence sector. We propose a novel framework that integrates stakeholder management with innovation and supply chain theories, offering a more nuanced understanding of supplier integration in high-stakes, technology-intensive industries. The study's implications extend beyond theoretical contributions, providing actionable insights for policymakers and industry leaders. We advocate for a paradigm shift in defence industrial policy, emphasizing long-term supplier partnerships, bilateral technology transfer agreements, and robust IP management strategies. Furthermore, we explore how emerging technologies like blockchain and AI can address persistent information security challenges. By synthesizing theoretical perspectives with practical recommendations, this research not only advances the scholarly discourse on supplier integration but also offers a roadmap for fostering a self-reliant, innovative defence ecosystem. These findings have broad implications for other emerging defence industries grappling with similar challenges in an increasingly complex global landscape.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Defence product development; Information security; Regulatory compliance; Stakeholder theory; Supplier integration

【发表时间】2025

【收录时间】2025-02-07

【文献类型】

【DOI】 10.56042/jsir.v84i1.11901

在线标注

备案号: 苏ICP备17025947号-5

评论回复