• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2025年04月09日 50篇

文献来源

  • 50

主题分类

      • 50

文献类型

  • 50
筛选
订阅
<< 前一天 后一天 >>

Synergizing blockchain and internet of things for enhancing efficiency and waste reduction in sustainable food management

【Author】 Zhang, Yang Gupta, Vijai Kumar Karimi, Keikhosro Wang, Yajing Yusoff, Mohd Azman Vatanparast, Hassan Pan, Junting Aghbashlo, Mortaza Tabatabaei, Meisam Rajaei, Ahmad

【影响因子】16.002

【主题类别】

--

【Abstract】Background: Reducing food waste in the food supply chain is paramount in our quest for sustainability. With growing concerns over environmental degradation, resource scarcity, and food insecurity, addressing this challenge has become a global imperative. To effectively tackle it, the use of blockchain along with the Internet of Things (BlockIoT) has emerged as a promising approach. By using decentralized and reliable systems built on blockchain technology, it is possible to devise a solution for better managing the agricultural supply chain. Scope and approach: The review article explores the potential of BlockIoT in tackling challenges within the food chain, such as traceability and waste reduction. This paper analyzes the benefits and limitations of blockchain solutions for sustainable food management, focusing on traceability and supply chain optimization. It also examines the technical and adoption challenges hindering blockchain implementation in the food industry. Key findings and conclusions: BlockIoT has the potential to make significant contributions to food supply chains, addressing all three pillars of sustainable development. Specifically, it can positively impact the social pillar by facilitating transparency and traceability, thus mitigating food fraud and ensuring food safety. Concerning the environmental pillar, BlockIoT has the potential to significantly reduce food waste and minimize the environmental footprint. Furthermore, BlockIoT has the potential to contribute to the economic pillar by lowering costs. However, achieving widespread blockchain implementation requires the participation of all stakeholders, which may be hindered by both technical and adoption challenges. These challenges encompass not only the technical aspects of implementing blockchain technology but also the broader issue of adoption throughout various industries and sectors. Further research focusing on empirical evidence and real-world implementation is needed to enhance understanding and enable the sustainable development of agriculture and smart agri-supply chain management.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Waste management; Sustainable development goals; Industry 4.0; Food supply chain; Traceability

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.tifs.2025.104873

Building Resilient Web 3.0 Infrastructure With Quantum Information Technologies and Blockchain: An Ambilateral View

【Author】 Ren, Xiaoxu Xu, Minrui Niyato, Dusit Kang, Jiawen Xiong, Zehui Qiu, Chao Yao, Haipeng Wang, Xiaofei

CCF-A

【影响因子】14.910

【主题类别】

--

【Abstract】Web 3.0 pursues the establishment of decentralized ecosystems through blockchain technologies, driving digital transformation in commerce and governance. With consensus algorithms and smart contracts grounded in cryptographic technologies, Web 3.0 enables secure and transparent digital services, such as digital identity, asset management, decentralized autonomous organizations (DAOs), and decentralized finance (DeFi), fostering integration between digital and physical economies. As quantum devices rapidly advance, Web 3.0 is being developed in parallel with the deployment of quantum cloud computing and quantum Internet. In this regard, quantum computing first disrupts the original cryptographic systems that protect data security while reshaping modern cryptography with enhanced quantum computing and communication capabilities. This article provides a comprehensive overview of blockchain-based Web 3.0, examining its quantum and postquantum advancements from two key perspectives. On the one hand, postquantum migration methods and quantum-resistant signatures offer robust solutions to safeguard blockchain against quantum threats. On the other hand, quantum and postquantum encryption and verification algorithms boost blockchain performance, creating a decentralized, secure, and value-driven system. Additionally, we outline potential applications of quantum blockchain and offer guidance for implementation within the Web 3.0 ecosystem. Finally, we discuss future directions for developing a provably secure and decentralized digital ecosystem.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Semantic Web; Quantum computing; Information technology; Security; Protocols; Cryptography; Encryption; Artificial intelligence; Quantum entanglement; Blockchain; decentralization; postquantum cryptograph; quantum computing

【发表时间】2024

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JPROC.2024.3520803

Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions

【Author】 Tani, Hamed alqah Kumar, Gulshan

【影响因子】14.324

【主题类别】

--

【Abstract】Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This article comprehensively explores these challenges and investigates artificial intelligence (AI)-driven solutions to bolster EnFV cybersecurity. The study begins with an overview of EnFV cybersecurity issues, emphasizing the increasing complexity of threats in digital transportation systems. Methodologically, the article reviews existing literature to identify gaps and assesses recent advancements in AI for cybersecurity applications. Key methodologies include AI-powered intrusion detection, threat analysis leveraging machine learning algorithms, predictive maintenance strategies, and enhanced authentication protocols. Results underscore the effectiveness of AI technologies in mitigating EnFV cybersecurity risks, demonstrating improved threat detection and response capabilities. The study concludes by outlining future research directions, highlighting the need for continued innovation in AI, quantum computing resilience, blockchain applications, and ethical considerations. These findings contribute to a clearer understanding of EnFV cybersecurity dynamics and provide a roadmap for enhancing the security and reliability of future transportation systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cybersecurity; electric vehicles; flying vehicles; artificial intelligence; transportation security

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1145/3697830

Blockchain in supply chains: an unfulfilled promise

【Author】 Lustenberger, Michael Spychiger, Florian

【影响因子】11.263

【主题类别】

--

【Abstract】PurposeThis paper investigates the influence of blockchain technology on trust and transparency within supply chain management. While existing research suggests blockchain has revolutionary potential, real-world evidence remains limited. This study aims to bridge this gap.Design/methodology/approachThe research relies on transaction cost analysis and principal-agent theory to develop a conceptual model. The model proposes how blockchain fosters trust and transparency, ultimately leading to a market-based governance model within supply chains. Five different blockchain applications were analyzed in a multi-case study through document reviews and expert interviews to test the model's assumptions.FindingsThe study's findings challenge initial assumptions. The complexity of blockchain networks and a reluctance to share information among participants hinder blockchain technology's ability to increase trust and transparency. Consequently, the expected reduction in opportunism and uncertainties is not observed, and a market-based governance model fails to materialize. In practice, supply chain partners gravitate toward permissioned blockchains managed by established consortia. Acting as trusted third parties, these consortia assume control over network management, rendering blockchain essentially unnecessary.Originality/valueThis paper sheds light on the practical limitations of blockchain technology in revolutionizing supply chain management. While blockchain promises much, the findings suggest that established consortia currently play a more critical role in fostering trust and transparency within supply chains.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Supply chain; Trust; Transparency; Transaction cost analysis; Principal-agent theory

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1108/SCM-03-2024-0192

A Journey From Traditional Supply Chain Processes to Sustainability-Oriented Blockchain Supply Chain: The Critical Role of Organizational Capabilities

【Author】 Polas, Mohammad Rashed Hasan Jahanshahi, Asghar Afshar Islam, Mohammad Ekramol Kabir, Ahmed Imran Sohel-Uz-Zaman, Abu Saleh Md. Al Fahad, Abdullah

【影响因子】10.801

【主题类别】

--

【Abstract】Blockchain technology has a great potential to transform how businesses approach sustainability by offering transparency, efficiency, and accountability across various processes. By adopting blockchain, businesses can not only meet growing consumer and regulatory demands for sustainability but also create competitive advantages by promoting resource efficiency, fostering trust, and building eco-conscious operations. Building on dynamic capabilities lens within the resource-based view (RBV) framework, and in order to know about antecedents and consequences of blockchain technology adoption, this study investigates how three types of organizational capabilities-namely, innovation capability, information-sharing capability, and technological capability-may facilitate the blockchain technology adoption and most importantly, how such adoption could impact firm performance. To test our research hypotheses, we collected survey data from 198 electronics companies in Dhaka, Bangladesh. The structural equation modelling has been used to test the model hypothesis. The findings showed that all three organizational capabilities-innovation capability, information-sharing capability, and technological capability-significantly facilitate blockchain technology adoption, which in turn leads to enhanced firm performance in small- and medium-sized enterprises, demonstrating the strategic value of blockchain in driving sustainability and competitiveness in electronics companies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; electronics companies; environmental sustainability; firm performance; SEM; sustainable development

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1002/bse.4159

A Decentralized Approach to Parking Space Management With Fine-Grained Permission Level Using Blockchain Technology

【Author】 Yeh, Lo-Yao Hung, Chia-Hsien Tsai, Po-Ting Huang, Jiun-Long

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】With the rising demand for parking spaces, effective management and allocation of parking resources have become increasingly crucial. Traditional intelligent transportation systems often rely on various sensors to gather parking space information, which is then transmitted to centralized servers for data analysis and storage. This approach poses security risks, such as single points of failure and system strain during peak periods, due to increased data transmission and processing. Additionally, the surge in user activity can degrade system performance. To address these issues, this article introduces a parking space search system that records parking information on a blockchain to ensure data integrity and incorporates fine-grained permission management. By utilizing threshold attribute-based encryption, our approach effectively reduces system burden during peak periods. Experimental results show that our system achieves a delay reduction ranging from 22% to 85.6% compared to the current schemes as the number of vehicles increases. These results underscore the practical security and feasibility of our proposed solution.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Encryption; Security; Blockchains; Internet of Things; Generators; Space vehicles; Privacy; Automated parking; Aerospace electronics; Reviews; Access control; attribute-based encryption (ABE); blockchain; parking space search; vehicular ad-hoc network (VANET)

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3477635

Blockchain and FL-Based Secure Architecture for Enhanced External Intrusion Detection in Smart Farming

【Author】 Singh, Sushil Kumar Kumar, Manish Khanna, Ashish Virdee, Bal

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Smart farming influences advanced technologies to optimize agricultural procedures, yet it meets significant cybersecurity challenges, particularly in external intrusion detection (EID). This article proposes a novel architecture combining blockchain technology and federated learning (FL) to reinforce the security of smart farming systems (SMSs) against external threats. The integration of blockchain ensures data authentication and transparent data storage, while FL enables collaborative model training without compromising data privacy. Our architecture employs ensemble learning (EL) for the local model at the ensemble layer to train each smart land's data and offers privacy-prevented security. These devices utilize FL techniques to collaboratively train intrusion detection models while preserving the confidentiality of sensitive data. The aggregated model completes data aggregation at the authentication layer, and the Proof of Authentication Consensus Algorithm is leveraged for smart land's data authentication. The Internet of Things Sensor device's identical information of smart lands is stored at the macro base stations (MBSs). After downloading the aggregated values of the aggregated model, the local model transfers the smart lands information to the Cloud layer for decision making and decentralized storage. The validation outcomes of the proposed architecture demonstrate excellent performance, with an average processing time of 3.663 s and 0.9956 accuracy for smart land compared to existing frameworks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart agriculture; Blockchains; Intrusion detection; Security; Authentication; Farming; Internet of Things; Agriculture; Privacy; Data privacy; Blockchain; enhance external intrusion detection (EID); federated learning (FL); privacy; security; smart farming

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3478820

Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity

【Author】 Shi, Yijie Fan, Kai Bai, Yuhan Zhang, Chonglin Yang, Kan Li, Hui Yang, Yintang

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Voting protocols are fundamental in modern society. With the ongoing evolution of communication technology and the Internet of Things, the importance of electronic voting protocols is anticipated to experience a significant rise in the advancement of smart cities. Leveraging the blockchain's tamper-resistant and publicly verifiable properties, along with the concept of enabling all participants to tally election results, blockchain-based self-tallying voting protocols effectively address the shortcomings of centralized traditional electronic voting. However, existing voting protocols still face the dual challenge of security and efficiency. The primary issues include the difficulty in ensuring voter anonymity and election fairness, as well as the insufficient system robustness and low tallying efficiency resulting from security design. To tackle these concerns, we propose a novel approach to constructing efficient and flexible voting protocols that concurrently ensure fairness and anonymity. Specifically, we encapsulate the decryption private keys corresponding to the public keys of encrypted ballots in time capsules to safeguard voting fairness. Additionally, based on our proposed approach, we construct an efficient and flexible score voting protocol for smart cities. The protocol employs traceable ring signature to protect the voter anonymity and public traceability, utilizes a dual-key additive homomorphic ElGamal encryption to encapsulate ballots. We also improve signature-based set membership proofs to verify the validity of ballots. Furthermore, through security analysis and performance evaluation, we demonstrate that our proposed protocol meets all security objectives with reasonable costs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Anonymity; blockchain; fairness; self-tallying; voting; Anonymity; blockchain; fairness; self-tallying; voting

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3478231

PKChain: Compromise-Tolerant and Verifiable Public Key Management System

【Author】 Mosakheil, Jamal H. Yang, Kan

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Public key management systems enable users to create, validate, and revoke public keys, serving as the foundation of public key cryptography. Traditional public key infrastructure (PKI) systems rely on centralized certificate authorities (CAs) to validate users and manage public keys, but this centralization creates a single point of failure. If a CA is compromised, it can register fake public keys or alter legitimate ones, leading to counterfeit certificates. While blockchain-based approaches decentralize CA authority across multiple entities, these solutions are largely reactive, focusing on certificate issuance and relying on user signatures for validation. They lack a robust mechanism to authenticate and authorize requests before certificate issuance, a crucial step typically managed by registration authorities (RAs) in CA-based PKI systems. To address this gap, we introduce PKChain, a novel compromise-tolerant and verifiable public key management system built on blockchain. PKChain addresses two key challenges: 1) it uses a threshold block validation (TBV) scheme for key request validation, where validators partially validate requests and 2) collaborate for full validation. Once a request gains majority approval, it advances to the aggregated commitment signature (ACS) scheme, where validators collectively issue certificates. By requiring majority approval in the TBV stage before moving to certificate issuance, PKChain ensures proactive security throughout the process. To achieve consensus on validation and issuance, we propose a threshold cryptography-based consensus mechanism called the practical Byzantine compromise-tolerant and verifiable (pBCTV) consensus model, integrating the TBV and ACS schemes with the practical Byzantine fault-tolerance (pBFT) protocol. Security analysis, performance evaluation, and prototype implementation validate PKChain's security, efficiency, and resilience.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Public key; Blockchains; Internet of Things; Collaboration; Monitoring; Consensus protocol; Standards; Smart contracts; Registers; Public key cryptography; Block validation; blockchain; compromise-tolerance; PKChain; public key infrastructure (PKI)

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3478754

SP-DEWOA: An Evolutionary Distributed Witness Node Election Method for Delegated Proof of Stake

【Author】 Lin, Hao Du, Jinze

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Delegated Proof of Stake (DPoS) is a widely utilized consensus protocol in blockchain-based Internet of Things (IoT) systems. We propose a heuristic algorithm-based accounting rights allocation method, also referred to as the witness election method, which aims to address the challenges in DPoS. The challenges associated with selected witness nodes that do not reflecting majority stakeholder preferences and susceptibility to manipulation of the vote. This method employs the Kendall's rank correlation as the fitness function to optimize the arrangement of the top-k producers, thereby maximizing stakeholder preferences. We propose a novel heuristic algorithm, termed SP-DEWOA, which combines the differential evolution algorithm and whale optimization with piecewise chaotic mapping to maximize permutation similarity, i.e., stakeholder preferences. To further improve the efficiency of SP-DEWOA, we parallelize SP-DEWOA based on the Spark-based parallelization design. Experimental results demonstrate that the witness nodes selected through SP-DEWOA are consistent with the preferences of the majority of stakeholders. Furthermore, SP-DEWOA has been proven to have high scalability and resilience against vote manipulation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Delegate Proof of Stake (PoS); Kendall's rank correlation; Picewise chaotic mapping; Picewise chaotic mapping; whale optimization; whale optimization; whale optimization

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3476248

TSFF: A Triple-Stream Feature Fusion Method for Ethereum Phishing Scam Detection

【Author】 Hou, Wenhan Cui, Bo Chen, Yongxin Li, Ru Song, Wanshui

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】As a representative of the public blockchain, Ethereum has been applied in various industries. However, the vast number of transactions on the platform has also brought a number of illegal activities, such as phishing scams, which have caused significant damage to the Ethereum ecosystem. Due to anonymity of the blockchain, it is difficult for detectors to extract features that can be directly applied to phishing scams detection. Existing studies mainly model Ethereum transaction records as a network and mine key information from them to identify phishing addresses. However, these methods usually employ traditional feature engineering or network embedding, ignoring the fine-grained features in the transaction network. In addition, since the original network is too large to make learning difficult, existing work usually uses random walk (RW) to sample a part of nodes for training, thus ignoring the multiplicity of the network. To address these issues, in this article, we propose a three-stream feature fusion (TSFF) approach to enhance the feature representation of nodes. Specifically, we construct node states to guide RW sampling, and manually extracted 8-D features from the resulting dataset as basic features. Temporal features are jointly learned through long short-term memory network and contrastive learning. We combine residual blocks and graph convolutional network to extract fine-grained structural features from transactional networks. Finally, we fuse these three types of features and input them into a downstream classifier. Experiments show that our TSFF (85.3% Precision) outperforms the state-of-the-art methods, and the effectiveness of each feature is demonstrated.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Feature extraction; Phishing; Blockchains; Smart contracts; Open source software; Cryptocurrency; Internet of Things; Accuracy; Image edge detection; Training; Ethereum; feature fusion; network embedding; phishing scam detection

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/JIOT.2024.3473771

A Multifaceted Analysis of Intelligent Vehicle Route Optimization

【Author】 Pooja Sood, Sandeep Kumar

CCF-B

【影响因子】9.551

【主题类别】

--

【Abstract】In the constantly changing realm of logistics and transportation management, the incorporation of Information and Communication Technology (ICT) has catalyzed transformative paradigm shifts in the approach and resolution of Vehicle Route Optimization (VRO). The current scientometric research paper embarks on a comprehensive exploration of the scholarly endeavors acquired from the Scopus database in the realm of ICT-assisted vehicle route optimization, spanning 2014-2023. The scientometric implications of the article encompass several pivotal dimensions, including publication patterns, (author, country, institution) co-authorship, geographical distribution, Document Co-citation network Analysis (DCA) and top articles based on betweenness centrality corresponding to each opted category of the current knowledge domain. A meticulous examination of the analyses revealed a significant research impact in the pervasive computing and communication technology categories. The co-authorship analysis presenting the interconnectedness of collaborative efforts across countries, authors, and institutions highlights the authors and universities of China and the United States as dominant players in the domain. The DCA elucidates research themes, including intelligent transportation systems, unmanned aerial vehicle-based wireless sensor networks, electric vehicle-based sustainable VRO, and vehicular ad-hoc networks. These themes underscore the current research trajectories within the field. Notably, quantum computing and blockchain emerged as prominent technologies. Overall, the study unveils the transformative impact of ICT on VRO, highlighting the key themes, future research directions and a collaborative research community poised for substantial innovation in this area of research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bibliometrics; Optimization; Transportation; Artificial intelligence; Market research; Data visualization; Collaboration; Systematic literature review; Quantum computing; Big Data; Dynamic vehicle routing problem (DVRP); vehicle to everything (V2X); vehicular ad-hoc networks (VANET); Internet of Vehicles (IoV); CiteSpace

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/TITS.2025.3528961

Use of non-fungible tokens in operations and supply chain management

【Author】 Helo, Petri Hao, Yuqiuge Gunasekaran, Angappa

【影响因子】9.018

【主题类别】

--

【Abstract】Non-fungible tokens (NFT) are secured storage methods for unique and non-interchangeable data items. While NFTs are commonly associated with digital arts and the cryptocurrency market, the paper explores their potential in industrial applications, particularly within operations and supply chain management. The paper introduces the technology and key processes of NFTs, providing a foundation for understanding their application in operations and supply chains. The design science method is employed by conducting requirement collection with a small group of experts and based on this a set of potential applications for operations and supply chain management is outlined. Five use case applications are presented from the requirements management point of view. The artefact developed in the process is a sample implementation, demonstrating how NFTs can be practically employed to address specific operational requirements. The results indicate that physical components, digital assets, uniqueness of the entity, contracts, security, and multiple stakeholders collectively enable various use cases where NFTs can provide value.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】non-fungible tokens; blockchain; operations; supply chain; information technology

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1080/00207543.2025.2449588

Quantum-resilient blockchain-enabled secure communication framework for connected autonomous vehicles using post-quantum cryptography

【Author】 Aslam, Anjum Mohd Bhardwaj, Aditya Chaudhary, Rajat

【影响因子】8.373

【主题类别】

--

【Abstract】Connected and Autonomous Vehicles (CAVs) are pivotal to the evolution of Intelligent Transportation Systems (ITS), offering enhanced connectivity and automation. However, the emergence of quantum computing poses significant security challenges to existing cryptographic protocols. This study addresses these challenges by proposing a hybrid security approach that combines Kyber Post-Quantum Cryptography (PQC) with an Adaptive Grouping Score-based Practical Byzantine Fault Tolerance (AGS-PBFT) blockchain mechanism. The key contribution of this study is the integration of lattice-based Kyber PQC, which is resistant to quantum attacks, with a dynamically adaptive AGS-PBFT blockchain. This integration aims to secure vehicular communications by ensuring data integrity, authenticity, and confidentiality while enhancing the scalability and efficiency of consensus processes in dynamic CAVs environments. The proposed hybrid approach has been validated through extensive simulations using the OMNET ++ and SUMO simulators. The simulation results demonstrate that our approach outperforms existing methods, achieving lower latency, reduced computation costs, higher throughput, and enhanced security levels. Overall, the findings and methodologies presented in the paper can serve as a valuable reference for researchers and practitioners aiming to enhance the security and efficiency of CAVs in the era of quantum computing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Post-quantum cryptography; Blockchain; Security; Connected and Autonomous Vehicles (CAVs); CRYSTAL-kyber; Adaptive grouping score-PBFT

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.vehcom.2025.100880

A malicious feature detection and prevention mechanism with BRDH approach for improved security in Homomorphic Blockchain

【Author】 Swanthana, K. Aravinth, S. S.

CCF-C

【影响因子】8.139

【主题类别】

--

【Abstract】In today's digital landscape, safeguarding sensitive data from external threats is a pressing concern. This paper introduces an innovative approach named Buffalo Recurrent Diffie Hellman (BRDH), designed to bolster data security by proactively identifying and mitigating potential risks. BRDH combines the power of African Buffalo optimization and Recurrent Neural Networks (RNN) to continuously monitor data in the cloud, swiftly detecting and responding to suspicious activities. Data encryption is employed to establish robust security measures using the Diffie-Hellman algorithm. Homomorphic encryption further enhances security by validating hash values and denying access in case of discrepancies. Authorized users receive a private key to decrypt cypher Text and access the original data securely. BRDH significantly enhances data confidentiality, achieves over 99 % accuracy in malicious feature detection, and reduces encryption/decryption times compared to conventional models, as demonstrated through applications in the stock market, healthcare, and network traffic data. BRDH sets a new standard in robust data protection amidst evolving security threats. Advantages

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Buffalo recurrent Diffie Hellman; African Buffalo optimization; Recurrent Neural Networks (RNN); Diffie Hellman algorithm; Data encryption; Homomorphic; Decrypt cypher Text

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.knosys.2024.112872

A decentralized asynchronous federated learning framework for edge devices

【Author】 Wang, Bin Tian, Zhao Ma, Jie Zhang, Wenju She, Wei Liu, Wei

【影响因子】7.307

【主题类别】

--

【Abstract】The traditional synchronous federated learning framework ensures global model consistency and accuracy. However, it is limited by the computational power differences between devices and the influence of non-IID data, which leads to inefficient training and insufficient model generalization performance. In this paper, we propose a decentralized asynchronous federated learning framework. The framework uses smart contracts deployed on the blockchain to manage edge devices for enhanced flexibility. At first, the framework performs model aggregation and validation through the use of consensus groups. It eliminates the potential single point of failure associated with centralized parameter servers. In addition, we propose a Federated Learning with Dynamically Growing Cache (FedDgc) method in a non-IID environment. The method reduces redundant gradient information exchange during initial feature extraction while maintaining the learning capability of the global model. Finally, the experimental results show that our framework has better test performance and guarantees the convergence speed of the model during training.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Blockchain; Smart contract; Edge device

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.future.2024.107683

Blockchain and timely auction mechanism-based spectrum management

【Author】 Zhang, Hongyi Liu, Mingqian Chen, Yunfei Zhao, Nan

【影响因子】7.307

【主题类别】

--

【Abstract】The rapid development of 5G/B5G communication networks and the exponential growth of next-generation wireless devices require more advanced and dynamic spectrum management and control architecture. Dynamic spectrum management and control based on blockchain is efficient and robust, but the cost of traditional consensus mechanisms is too high. In this paper, we propose anew spectrum management and control architecture based on blockchain and deep reinforcement learning, which proposes anew energy-saving consensus mechanism called proof of hierarchy to encourage blockchain users to perform spectrum sensing and detect spectrum violations. Meanwhile, we propose a timely auction mechanism based on deep reinforcement learning for dynamic spectrum management, achieving secure, efficient, and dynamic allocation of spectrum resources. Through intelligent resource allocation and trusted transaction mechanism, efficient spectrum management is realized to improve spectrum utilization and alleviate the shortage of spectrum resources. The simulation verifies the effectiveness of the proposed architecture. We construct a spectrum management scenario and compare it with the traditional spectrum management method. The experimental results show that the proposed architecture can allocate spectrum resources more efficiently and provide a better user experience.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】5G/B5G communication network; Blockchain; Consensus mechanism; Deep reinforcement learning; Spectrum management

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.future.2024.107703

Blockchain and digital twin empowered edge caching for D2D wireless networks

【Author】 Du, Jianbo Yu, Zuting Li, Shulei Hu, Bintao Gao, Yuan Chu, Xiaoli

【影响因子】7.307

【主题类别】

--

【Abstract】Edge caching is considered a promising technology to fulfill user equipment (UE) requirements for content services. In this paper, we explore the use of blockchain and digital twin technologies to support edge caching in a Device-to-Device (D2D) wireless network, where each UE may fetch content from its own caching buffer, from other UEs through D2D links, or from a content server. A digital twin monitors and predicts the operating status of UE by storing crucial data such as the location, estimated processing capability, and remaining energy of each UE. To enable secure and credible trading between UEs, the blockchain technology is used to supervise transactions and constantly update UEs' reputation values. We formulate an optimization problem to maximize an objective function that considers the content fetching performance, network lifetime and UE's handover costs by optimizing the content placement and fetching strategies, subject to constraints on the UE's storage capacity, the upper limit of serving other UEs, and latency requirements. To solve this complicated problem fora dynamic network environment, we propose a proximal policy optimization-based deep reinforcement learning framework. Simulation results demonstrate that our proposed algorithm converges rapidly and can efficiently maximize the rewards, network lifetime and content fetching gain while minimizing handover costs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Edge caching; Blockchain; Device-to-device; Digital twin; Proximal policy optimization

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.future.2024.107704

A blockchain-based LLM-driven energy-efficient scheduling system towards distributed multi-agent manufacturing scenario of new energy vehicles within the circular economy

【Author】 Liu, Changchun Nie, Qingwei

【影响因子】7.180

【主题类别】

--

【Abstract】As processing technology is becoming increasingly complex, a single enterprise is no longer able to satisfy all the customization needs, which also requires extra energy consumption and vast time to seek cooperation from other enterprises for processing, especially in the field of new energy vehicle manufacturing. To coincide with the circular economy principle, a blockchain-based Large Language Model (LLM)-driven energy-efficient scheduling solution is proposed towards distributed multi-agent manufacturing scenario of new energy vehicles in this work. Firstly, distributed manufacturing system has the potential to efficiently organize distributed manufacturing resources by abstracting various machines from different factory nodes into agents with corresponding processing capabilities. Additionally, energy-efficient scheduling in line with the circular economy principles helps to optimize production cycle and reduce energy consumption and delay time, thereby lowering production costs and enhancing competitiveness. Compared with the traditional methods that suffer from long training time and local optimization, LLMs offer innovative solutions by learning a wealth of experiential knowledge in advance from vast amounts of data to further support self-adaptive and real-time energy-efficient scheduling. It is also worth noting that untrusted production data in factories may mislead the learning process of LLM, which may generate incorrect decision results. Therefore, a credit evaluation-based consensus mechanism is proposed to provide a trustworthy data access in distributed manufacturing, which can improve the transparency and traceability of the whole production process. Finally, the proposed approach is validated in the distributed manufacturing scenario for new energy vehicles. Compared with common methods, experimental results demonstrate the superiority of the proposed method on the distributed multi-agent manufacturing scenario for new energy vehicles, highlighting its potential to enhance production efficiency and circular economy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Large language model; Energy-efficient scheduling; Blockchain; Distributed manufacturing; Multi-agent; Circular economy

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.cie.2025.110889

Blockchain-enhanced smart contracts for formal verification of IoT access control mechanisms

【Author】 Guo, Zhifeng

【影响因子】6.626

【主题类别】

--

【Abstract】Technologies like Bluetooth and WiFi enable more and more devices to become interconnected, forming the IoT ecosystem. However, this growing connectivity brings significant security risks, especially in terms of access management. Blockchain technology, alongside smart contracts, has introduced novel ways to address trust concerns in decentralized networks. Traditional internet of Things (IoT) access control models rely on centralized authorities, making them vulnerable to single points of failure. Additionally, many smart contracts deployed today have exploitable weaknesses that can be leveraged to steal digital assets. To address this issue, we propose a decentralized approach, leveraging blockchain technology and smart contracts to ensure security and trust. Our methodology formalizes smart contract behavior using Transition Systems (TS) and Computation Tree Logic (CTL), allowing for the verification of key properties. Solidity code is translated into the Verds model-checking tool, which validates the correctness and security of the contracts. Our experiments demonstrate that the method is both scalable and effective, ensuring secure execution of smart contracts in dynamic IoT environments. This approach not only mitigates security risks but also highlights the potential of formal verification in improving the robustness of smart contracts, making them suitable for deployment in real-world applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; IoT access control mechanisms; Formal verification; Block chain; Transition systems; Computation tree logic

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.aej.2024.12.109

The heterogeneity of consumer preference for blockchain-based food traceability: The role of governmental trust and information-seeking behaviour

【Author】 Tran, Duc De Steur, Hans Gellynck, Xavier Papadakis, Andreas Schouteten, Joachim J.

【影响因子】6.345

【主题类别】

--

【Abstract】Recent incidents of food fraud and growing concerns about sustainability in food production have led to increased consumer preference for food traceability. Governments, responsible for enforcing food traceability regulations and overseeing food systems, play a crucial role in this context. Consequently, trust in government could significantly influence consumer behaviour and their valuation of food traceability systems. Blockchain (BC) technology, recently implemented in food traceability, has gained popularity due to its potential to create a "trustless" trust environment. This study aims to understand how consumers with varying levels of trust in the government value BC-based traceability systems. An online choice experiment (n = 707) focused on Greek feta cheese was conducted to explore this relationship. Four consumer segments were identified, profiled, and labelled as Engaged, Sceptic, Vigilant, and Reliant. The findings reveal that consumers with low trust in government and a high tendency to seek product information place a high value on BC-based food traceability compared to other labelling schemes. Conversely, consumers who trust the government and do not actively seek product information show a preference for the well-known PDO certification over food traceability labels. These results highlight the potential for promoting BC-based traceability among consumers, as a sizeable segment demonstrates interest in such traceable products.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Trust; Food traceability; Blockchain; Choice experiment; Consumer segmentation; Consumer behaviour

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.foodqual.2024.105424

Stability analysis of maritime logistics alliance based on blockchain

【Author】 Qian, Xueqi Shen, Lixin Wang, Yanan Lin, Jinglin Jin, Zhihong Ge, Ying-En Haddad, Sandra Samy George

【影响因子】6.173

【主题类别】

--

【Abstract】Maritime logistics is essential to international trade, and maritime logistics alliances significantly enhance the efficiency, service quality, and competitiveness of maritime logistics through the complementary advantages and risk sharing among member enterprises. Blockchain can better solve the problems of information asymmetry and lack of trust in logistics alliances because of its decentralization and other characteristics. However, enhancing the rationality of benefit distribution of maritime logistics alliances based on blockchain is still a key issue to be addressed. In this paper, we first construct an evolutionary game model base on blockchain to analyze alliance stability among members. Through numerical simulation, we identify that the reasonable benefit distribution is the most significant influencing factor for alliance stability. Then, using the modified Shapley value method, we establish the benefit distribution model of alliance based on blockchain. Finally, based on blockchain, we design, deploy, and call a smart contract for the benefit distribution of maritime logistics alliances, which is intelligent and can be used for alliance benefit distribution.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Maritime logistics alliance; Game theory; Benefit distribution; Smart contract

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.tranpol.2024.12.025

Are base layer blockchains establishing a new sector? Evidence from a connectedness approach

【Author】 Lee, Geul Ryu, Doojin

【影响因子】6.143

【主题类别】

--

【Abstract】This study explores whether layer-1 blockchain platforms are evolving into an independent sector within the blockchain industry. We employ time-varying parameter and quantile vector autoregressive connectedness approaches to examine the return connectedness among the native tokens of layer-1 blockchain platforms and a comparison group. Our empirical results reveal a strengthening return connectedness among layer-1 native tokens, contrasting with observations from the comparison group. Layer-1 blockchain platforms are becoming more closely related over the sample period and may be progressing toward the establishment of an independent sector. Our findings highlight a growing need to investigate the connectedness of assets within the cryptocurrency market to better understand its structure and determine which cryptocurrencies can be grouped into sectors.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Layer-1; Blockchain; Cryptocurrency; Connectedness; Spillover; Tokenization

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.ribaf.2024.102654

Relationship of green cryptocurrencies, energy tokens, centralized and decentralized exchange tokens with crypto policy uncertainty

【Author】 Nasir, Rana Muhammad He, Feng Yousaf, Imran

【影响因子】6.143

【主题类别】

--

【Abstract】We investigate the relationship of green cryptocurrencies, energy tokens, and centralized and decentralized exchange tokens with crypto policy uncertainty. We employ a novel systematic quantile with cross-quantilogram and quantile time-frequency methodologies. Despite the astonishing popularity of new crypto classes, there are serious concerns about their centralization and their environmental consequences. This study draws a detailed picture about our chosen crypto classes by studying the role of crypto uncertainty. A noteworthy finding is that each market reacts differently against crypto policy uncertainty across different quantiles and frequencies. Specifically, our results reflect that UCRY has a significant positive association with our chosen markets in the short run across all quantiles. The higher connectedness, particularly in the short run, between UCRY and selected markets, suggests that investors should look at other investment options. For instance, CEX tokens (BNB, OKB), DEX tokens (RUNE, SNX), energy tokens (POWR, GRID), and green cryptocurrencies provide more diversification benefits against UCRY, while cryptocurrencies and tokens do not play a role as a hedge against crypto policy uncertainty in the long run. We find UCRY, MIOTA, and SNC are top receivers, while BNB, RUNE, and XRP are the major transmitters over the study period. Our study provides detailed insights to investors, regulators, and policymakers regarding the hidden dynamics as well as potential portfolio benefits of these specific markets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cross quantilogram; Blockchain; Green crypto; Energy; Tokens

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.ribaf.2024.102743

Enhancing smart city infrastructure with a geospatial blockchain-based addressing system

【Author】 Lee, Jeongu Yang, Byungyun

【影响因子】6.077

【主题类别】

--

【Abstract】The rapid development of smart cities necessitates an accurate and secure address system to support the integration of urban infrastructure with advanced digital technologies. Traditional address systems, although foundational to urban organization, are increasingly inadequate in meeting the demands of dynamic and evolving urban environments. This study aims to address this gap by integrating innovations in Geographic Information Science (GIS) with geospatial blockchain technology to develop a robust addressing framework for smart cities. Specifically, the research focuses on (1) providing precise spatial address assignments, (2) mitigating the social challenges arising from the pervasive use of address data, and (3) optimizing the structure of addressinformation systems within a smart city paradigm. In response to these challenges, we propose a novel geospatial blockchain model that incorporates an optimized geohash grid, designed to enhance both the accuracy and security of address management. Central to this model is the concept of the Address of Space (AoS), which offers a solution for assigning addresses to previously unaddressed urban entities, such as land parcels and dynamic objects, including moving vehicles (e.g., food trucks) and stationary but frequently relocated indoor assets (e.g., AED units). The study's findings validate the efficacy of the proposed framework, highlighting its potential to revolutionize the management of address data, improving both its precision and security. By bridging the gap between physical and digital address systems, this research paves the way for more secure, efficient, and scalable addressing solutions in the era of smart cities.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Geospatial blockchain; Smart city; Address of space model; GIScience; Georeferencing

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.cities.2025.105757

Designing the future of bond markets: Reducing transaction costs through tokenization

【Author】 Cisar, David Schellinger, Benjamin Stoetzer, Jens-Christian Urbach, Nils Weiss, Florian Lennart Gramlich, Vincent Guggenberger, Tobias

【影响因子】6.017

【主题类别】

--

【Abstract】Corporate bonds are an attractive option for corporate financing. However, current bond markets face many challenges and inefficiencies, resulting in high transaction costs (TAC). In recent years, technological advancements like blockchain technology have enabled the possibility of reducing TAC in bond markets. Even though practice experiments with such solutions, academic literature lacks generic design knowledge under the TAC lens to design blockchain-based bonds. Thus, our research follows the design science research (DSR) paradigm to design and develop a bond prototype using the Ethereum blockchain protocol. Our results highlight the capability of blockchain-based bond markets to reduce TAC in the three dimensions of asset specificity, uncertainty, and transaction frequency. Further, our research provides design principles to contribute to both practice and the academic discourse on developing blockchain-based bond markets with reduced TAC.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bonds; Design science research; Transaction cost theory; Blockchain; M15; G14; D23

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s12525-025-00753-3

Electric vehicle charging network security: A survey

【Author】 Hu, Xin Jiang, Xiaoning Zhang, Jie Wang, Shouguang Zhou, Mengchu Zhang, Bei Gan, Zhigang Yu, Binxiao

【影响因子】5.836

【主题类别】

--

【Abstract】With the rising number of electric vehicles, their charging network has expanded into a vast and intricate system involving multiple stakeholders and numerous charging service entities. It relies on various technologies, such as communication protocols, network connections, and data transmission, leading to the generation of substantial amounts of sensitive data. Ensuring its high security requires the implementation of a comprehensive array of security measures, including stringent identity authentication and access control techniques, cryptographic solutions to safeguard data, and diverse strategies for detecting and countering network attacks. In this article, we present a comprehensive overview of the mainstream architectures and communication protocols in electric vehicle charging networks. We also provide a brief introduction to other protocols used in charging networks and explore the charging infrastructure and its associated security requirements. We examine a charging network's security challenges at its perception, network, and application layers, and summarize the important solutions proposed in recent literature. Additionally, we delve into privacy security and payment security in the charging business. We investigate the utilization of blockchain technology to safeguard charging networks. Finally, we highlight public safety issues of a charging network and suggest future research directions to steer further studies of charging network security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Electric vehicle; Charging network; Internet of Things; Security; Privacy; Payment; Blockchain

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.sysarc.2025.103337

DBDAA: Dual blockchain and decentralized identifiers assisted anonymous authentication for building IoT

【Author】 Wu, Xiaohua Luo, Zheng Cheng, Jun Wang, Puyan

【影响因子】5.836

【主题类别】

--

【Abstract】The rapid advancements in the Internet of Things (IoT) and blockchain have made building IoT a critical element in modern intelligent building management. However, with the increasing adaptability of building IoT systems, concerns about data security and privacy have risen. Traditional solutions often rely on a single user identity, which poses security risks. Additionally, these solutions overlook the security of user permission information in access control systems. Asa result, users with elevated permissions become prime targets for attacks. Existing key management mechanisms also have shortcomings, especially in key recovery processes. To address these issues, this paper proposes an identity authentication mechanism leveraging dual-blockchain and decentralized identifier (DID) technology. In the proposed mechanism, we develop a lightweight authentication scheme for devices. We also create a multi-DID model for users and further propose an anonymous authentication scheme, to safeguard data privacy, identity, and permission information, striking a balance between anonymity and oversight. Moreover, we design a key backup and recovery scheme to safeguard against key loss or damage, increasing system reliability. Experimental results demonstrate that our scheme enhances security while reducing computational and communication overhead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things (IoT); Blockchain; Anonymity; Authentication; Key backup and recovery

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.sysarc.2025.103334

Supporting constrained devices and networks in the decentralised Internet of Things

【Author】 Kurte, Ryan Salcic, Zoran Wang, Kevin I. -Kai

【影响因子】5.711

【主题类别】

--

【Abstract】The ongoing growth of the Internet of Things (IoT) offers great opportunities to improve the way we understand and interact with the physical world. However, existing approaches face a number of challenges from providing scalable and reliable services to users to addressing the need for security and privacy. We believe decentralised architectures offer a valuable alternative to centralised approaches. However, increased performance and communication requirements render existing decentralised technologies unsuitable for use with the constrained edge- and end-devices popular in the IoT. In this paper we address these limitations. First by extending DSF-IoT with a novel mechanism for delegation to enable transparent interactions with and between IoT services on constrained and unconstrained end-devices without the trust and privacy boundaries of existing approaches. Second, delegation is demonstrated through the creation of what we believe to be the first real-world heterogeneous decentralised IoT network spanning WSAN connected microcontrollers, Arm-based single board computers, and unconstrained x64 devices. Third, we qualify DSF-IoT for use on constrained edge-devices through the development of a constrained gateway prototype and test-bench for measuring the performance of IoT brokers under varying operating conditions. This demonstrates that DSF-IoT offers equivalent (or improved) performance to popular CoAP and MQTT brokers on constrained edge-devices while providing historical data storage and access as well as end-toend trust and privacy. Finally we perform a functional comparison of DSF-IoT against existing protocols and research to highlight the advantages of our approach and the suitability of DSFIoTs and delegation for use with constrained edge- and end-devices to enable the creation of a truly heterogeneous future decentralised Internet of Things.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Decentralisation; Constrained devices; Peer-to-peer

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.iot.2025.101496

Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions

【Author】 Naik, Azmera Chandu Awasthi, Lalit Kumar Priyanka, R. Sharma, T. P. Verma, Aryan

CCF-B

【影响因子】5.493

【主题类别】

--

【Abstract】The Internet of Things (IoT) is an advanced concept in computer networking that enables smooth interconnection and communication across different types of devices around us. The vast applications of the adaptable connections of IoT devices are evident innumerous sectors, including smart surveillance, environmental monitoring, infrastructure management, and our home. Although IoT has numerous advantages, its fundamental openness and dependence on wireless networks make it vulnerable to several security risks that can cause monetary and privacy losses. This paper offers an extensive examination of privacy concerns, weaknesses in the security of IoT networks, attacks at several layers of the IoT architecture, and steps taken to mitigate these difficulties with computational methods. Our debate begins with an analysis of the significant privacy and security issues faced by users of IoT devices, highlighting the need for strict security regulations. Next, we examine a classification of attacks for each layer of the IoT in order to clarify the specific security requirements. In this study, we present a comprehensive review of the literature, organizing current security approaches into four major categories: authentication, encryption, trust management, and secure routing. The review's focus is primarily on recent advancements in safe routing. Furthermore, our analysis of secure routing is centered around clustering techniques and routing protocols that are aware of quality of service (QoS). We conduct a comparative examination of several techniques for each category, examining their contributions and methods, and then identifying any potential weaknesses. Further, through this review, we offer a comprehensive technical analysis of the difficulties and solutions related to IoT security, with the goal of promoting progress in safeguarding IoT ecosystems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】IoT security; Secure routing; Privacy and trust management; Metaheuristic algorithms

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.comnet.2025.111045

Crypto ecosystem: navigating the past, present, and future of decentralized finance

【Author】 Bongini, Paola Agnese Mattassoglio, Francesca Pedrazzoli, Alessia Vismara, Silvio

【影响因子】5.337

【主题类别】

--

【Abstract】From Nakamoto's genesis block, 15 years of technological advancements, new financial instruments, regulations, and emerging participants have defined the Crypto Ecosystem. This paper chronicles its development from the creation of Bitcoin to the present-day landscape of cryptocurrencies, tokens, and decentralized finance applications. It explores the foundational technologies, financial instruments, key players, and regulatory frameworks in Europe and the US. By critically assessing the current state of the crypto market, the paper identifies both the promises fulfilled and the challenges that remain. It contributes to the existing literature by providing a synthesized understanding of the crypto ecosystem, highlighting the interplay between technological advancements and financial market dynamics.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital finance; Blockchain; Crypto; Cryptocurrency; DeFi

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s10961-025-10186-x

Technological insights on blockchain adoption: the electric vehicle supply chain use case

【Author】 Capocasale, Vittorio Bruni, Maria Elena Perboli, Guido

【影响因子】4.750

【主题类别】

--

【Abstract】PurposeBlockchain and distributed ledger technologies are increasingly prominent, yet their adoption remains complex. This paper addresses the common misalignment between blockchain technology and actual needs, often leading to project failure. It introduces a decision-making framework focused on the technological aspects of blockchain adoption.Design/methodology/approachWe designed the framework by analyzing key decision drivers from existing literature and applied it to a real-world use case in the electric vehicle supply chain. The blockchain solution was tested with live production data.FindingsBlockchain is beneficial for use cases requiring decentralized governance, but it often needs to be supplemented with additional technologies in industrial applications.Originality/valueThe framework provides a set of managerial-level questions that simplify the decision-making process for those without deep technical expertise, helping determine when blockchain is appropriate, valuable and superior to other technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain adoption; Blockchain suitability; Electric vehicles; Supply chain; Hyperledger Besu

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1108/EJIM-06-2024-0701

Knowledge domain and frontier trends of artificial intelligence applied in solid organ transplantation: A visualization analysis

【Author】 Gong, Miao Jiang, Yingsong Sun, Yingshuo Liao, Rui Liu, Yanyao Yan, Zikang He, Aiting Zhou, Mingming Yang, Jie Wu, Yongzhong Wu, Zhongjun Huang, Zuotian Wu, Hao Jiang, Liqing

【影响因子】4.730

【主题类别】

--

【Abstract】Background: Solid organ transplantation (SOT) is vital for end-stage organ failure but faces challenges like organ shortage and rejection. Artificial intelligence (AI) offers potential to improve outcomes through better matching, success prediction, and automation. However, the evolution of AI in SOT research remains underexplored. This study uses bibliometric analysis to identify trends, hotspots, and key contributors in the field. Methods: 821 articles from the Web of Science Core Collection were exported for analysis. Microsoft Excel 2021 was used for descriptive statistics. VOSviewer, CiteSpace, Scimago Graphica, and Biblioshiny were used for bibliometric analysis. The ggalluvial package in R was utilized to create Sankey diagrams, and top articles were selected based on citation count. Results: This analysis reveals the rapid expansion of AI in SOT. Key areas include robotic surgery, organ allocation, outcome prediction, immunosuppression management, and precision medicine. Robotic surgery has improved transplant outcomes. AI algorithms optimize organ matching and enhance fairness. Machine learning models predict outcomes and guide treatment, while AI-based systems advance personalized immunosuppression. AI in precision medicine, including diagnostics and imaging, is crucial for transplant success. Conclusion: This study highlights AI's transformative potential in SOT, with significant contributions from countries like the USA, Canada, and the UK. Key institutions such as the University of Toronto and the University of Pittsburgh have played vital roles. However, practical challenges like ethical issues, bias, and data integration remain. Fostering international and interdisciplinary collaborations is crucial for overcoming these challenges and accelerating AI's integration into clinical practice, ultimately improving patient outcomes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Artificial intelligence; Data visualization; Bibliometric analysis; Solid organ transplantation; Trends

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.ijmedinf.2024.105782

Virtual reality integration and credible traceability management method of transformer coil manufacturing process based on industrial internet and digital twin

【Author】 Zhang, Xuedong Sun, Wenlei Wang, Lixin Yifei, Hua Chen, Ke

【影响因子】4.420

【主题类别】

--

【Abstract】The traceability and management of the transformer coil manufacturing process lack credibility and transparency, which limits its efficiency and convenience. To address this issue, this paper proposes a novel approach for trusted traceability and management of coils in the manufacturing process. This method leverages the virtual-real fusion through the integration of industrial internet identification and resolution, blockchain technology, and digital twins. To ensure trusted storage and precise traceability of information in the coil manufacturing process, the structure of a reliable identification block for all the elements of the coil manufacturing information is studied. A trusted interaction mechanism based on distributed Oracle is also proposed for uploading data to the blockchain. An efficient traceability process for coil manufacturing information is then designed. To ensure the transparency and timeliness in the traceability of the coil manufacturing process, a digital twin modeling method based on industrial internet NFTs is studied, and a virtual-real fusion traceability process based on digital twins is expanded. A coil production workshop is considered as an example to conduct experiments and verifications. The virtual-real fusion trusted traceability of the coil manufacturing process is finally performed based on the identification of all the resources in the workshop and the integration of full-process information.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Coil manufacturing; identification resolution; blockchain; digital twin; virtual-real fusion; trusted traceability

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1080/0951192X.2025.2452615

Forecasting topic trends of blockchain utilizing topic modeling and deep learning-based time-series prediction on different document types

【Author】 Park, Yejin Lim, Seonkyu Gu, Changdai Syafiandini, Arida Ferti Song, Min

【影响因子】4.373

【主题类别】

--

【Abstract】Topic trends in rapidly evolving domains like blockchain are dynamic and pose prediction challenges. To address this, we propose a novel framework that integrates topic modeling, clustering, and time-series deep learning models. These models include both non-graph-based and graph-based approaches. Blockchain-related documents of three types-academic papers, patents, and news articles-are collected and preprocessed. Random and topic subgraphs are constructed as inputs for model training and forecasting across various time epochs. The four models (LSTM, GRU, AGCRN, and A3T-GCN) are trained on random subgraphs, and the trained models forecast topic trends using topic subgraphs. We also analyze the distinctive characteristics of each document type and investigate the causal relationships between them. The results indicate that non-graph-based models, such as LSTM, perform better on periodic data like academic papers, whereas graph-based models, such as AGCRN and A3T-GCN, excel at capturing non-periodic patterns in patents and news articles. Our framework demonstrates robust performance, offering a versatile tool for blockchain-related trend analysis and forecasting. The code and environments are available at https://github.com/textmining-org/topic-forecasting.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】time-series forecasting; topic modeling; agglomerative clustering; LSTM; GRU; AGCRN; A3T-GCN; blockchain

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.joi.2025.101639

Stablecoins as anchors? Unraveling information flow dynamics between pegged and unpegged crypto-assets and fiat currencies

【Author】 Palazzi, Rafael Baptista Schich, Sebastian de Genaro, Alan

【影响因子】4.217

【主题类别】

--

【Abstract】This study empirically investigates the potential of stablecoins to act as anchors within the volatile cryptocurrency market, using a novel conceptual framework that defines an anchor asset in three dimensions relative to other assets, namely stability, independence, and resilience. To assess these three dimensions, we employ three distinct methods to analyze the linear and nonlinear relationships between stablecoins (Tether, USD Coin, and Binance USD), the top three unpegged crypto-assets (Bitcoin, Ethereum, and Binance), and the three most heavily traded fiat currencies after the US dollar (EUR, JPY, and GBP), all denominated in USD. Specifically, we utilize Granger causality, asymmetric dynamic conditional correlation (ADCC)-GARCH, and transfer entropy approaches. These methods help us examine volatility spillover effects among the three types of assets. Our resilience criteria requires us to measure market liquidity, which we do by employing the turnover ratio weighted by market capitalization and the approach proposed by Abdi and Ranaldo (2017). The results challenge the notion that stablecoins are robust anchors in the sense that they are more stable, independent, or resilient than other types of assets, and cast doubt on the suggestion that stablecoins might become a useful means of exchange that provide a private alternative to existing fiat currencies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Stablecoins; Transfer entropy; Fiat currencies; Cryptoassets; Anchor

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.intfin.2024.102108

BlockLLM: A futuristic LLM-based decentralized vehicular network architecture for secure communications

【Author】 Arshad, Usama Halim, Zahid

【影响因子】4.152

【主题类别】

--

【Abstract】Autonomous vehicles and Intelligent Transportation Systems (ITS) represent some of the most transformative technological advancements. However, these complex systems face significant challenges, including data security, scalability, node reliability, and secure communication. Current approaches often integrate Artificial Intelligence (AI), Machine Learning (ML), and blockchain to enhance robustness and flexibility, but issues like latency, privacy, and node selfishness remain. This paper proposes BlockLLM, a comprehensive vehicular network architecture that combines blockchain and Large Language Models (LLMs) to address these core issues in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. Blockchain technology ensures data integrity, nonrepudiation, and trustless communication across nodes, while LLMs provide adaptive decision-making and reduce latency in real-time data exchange. BlockLLM's incentive and reputation mechanisms further enhance node participation and reliability. Simulation results demonstrate an 18% reduction in latency, a 12% improvement in throughput, and consistent data integrity across high-traffic scenarios. These findings indicate that BlockLLM offers a robust, scalable solution for secure V2X communication, making it a promising model for future autonomous transportation systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Vehicular Network Architecture (VNA); Large Language Models (LLM); Vehicle-to-Everything (V2X); Data integrity; Scalability

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1016/j.compeleceng.2024.110027

RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT

【Author】 Jia, Guanwei Shen, Zhaoyu Sun, Hongye Xin, Jingbo Wang, Dongyu

【影响因子】3.847

【主题类别】

--

【Abstract】This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. Traditional centralized IoT architectures often face issues such as single points of failure and insufficient reliability, while blockchain, with its decentralized and tamper-resistant properties, offers a promising solution. However, existing blockchain consensus mechanisms struggle to meet the high throughput, low latency, and scalability demands of IoT applications. To address these limitations, RWA-BFT adopts a two-layer blockchain architecture; the first layer leverages reputation-based filtering to reduce computational complexity by excluding low-reputation nodes, while the second layer employs an asynchronous consensus mechanism to ensure efficient and secure communication among high-reputation nodes, even under network delays. This dual-layer design significantly improves performance, achieving higher throughput, lower latency, and enhanced scalability, while maintaining strong fault tolerance even in the presence of a substantial proportion of malicious nodes. Experimental results demonstrate that RWA-BFT outperforms HB-BFT and PBFT algorithms, making it a scalable and secure blockchain solution for decentralized IoT applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; IoT; BFT; asynchronous consensus; scalability

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.3390/s25020413

DAG-Based Swarm Learning Approach in Healthcare: A Survey

【Author】 Gana, David Jamil, Faisal

【影响因子】3.476

【主题类别】

--

【Abstract】Healthcare systems are advancing at a rapid pace as a result of new technologies to address several issues in the sector such as shortage of skilled health workers and to deal with new diseases like COVID-19. Incorporating technologies like blockchain, federated learning, swarm learning, and Directed Acyclic Graphs is transforming healthcare. This article thoroughly examines recent progress and uses at the intersection of these technologies within the healthcare field. Blockchain's innovative consensus mechanisms and secure data flow systems offer encouraging solutions to crucial issues in healthcare data management and security. Also, federated learning has been deployed in various ways to tackle healthcare challenges enabling collaborative data analysis while upholding patient confidentiality. Swarm learning algorithms have been notably effective in healthcare, enriching medical diagnostics, disease prognosis, and precision medicine. Solutions based on Directed Acyclic Graphs present scalable and effective alternative to traditional blockchain frameworks, providing improved consensus speed and decreased bottlenecks in transaction processing. These advancements signify a shift in direction towards fully decentralised and secure healthcare systems. This paper highlights the transformative impact of these technologies on medical diagnostics, disease prediction, and precision medicine.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; directed acyclic graph; federated learning; federated learning; IoT; IoT; privacy; privacy; scalability; scalability; smart healthcare; smart healthcare; swarm learning; swarm learning; swarm learning

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1109/ACCESS.2025.3531216

GIS-Driven Methods for Scouting Sources of Waste Heat for Fifth-Generation District Heating and Cooling (5GDHC) Systems: Railway/Highway Tunnels

【Author】 Chicherin, Stanislav

【影响因子】3.352

【主题类别】

--

【Abstract】This paper explores the innovative application of Geographic Information Systems (GISs) to identify and utilize waste heat sources from railway and highway tunnels for fifth-generation district heating and cooling (5GDHC) systems. Increasing the number of prosumers-entities that produce and consume energy-within 5GDHC networks enhances their efficiency and sustainability. While potential sources of waste heat vary widely, this study focuses on underground car/railway tunnels, which typically have a temperature range of 20 degrees C to 40 degrees C. Using GIS software, we comprehensively analyzed tunnel locations and their potential as heat sources in Belgium. This study incorporates data from various sources, including OpenStreetMap and the European Waste Heat Map, and applies a two-dimensional heat transfer model to estimate the heat recovery potential. The results indicate that railway tunnels, especially in the southern regions of Belgium, show significant promise for waste heat recovery, potentially contributing between 0.8 and 2.9 GWh annually. The integration of blockchain technology for peer-to-peer energy exchange within 5GDHC systems is also discussed, highlighting its potential to enhance energy management and billing. This research contributes to the growing body of knowledge on sustainable energy systems and presents a novel approach to leveraging existing district heating and cooling infrastructure.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】prosumers; heat recovery; thermal modeling; blockchain technology; sustainable renewable energy; urban infrastructure

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.3390/pr13010165

Anomaly detection algorithms for vehicle-to-network interaction operator-level interactive control support systems based on machine learning

【Author】 Wang, Wen Li, Peijun Yang, Ye Qin, Jian Zu, Guoqiang Xu, Ke Zhang, Xiaoqing Yu, Jiancheng

【影响因子】3.071

【主题类别】

--

【Abstract】This study proposes a charging transaction model based on a consortium blockchain to establish a mutual trust network between operators and power supply companies. The model employs the Practical Byzantine Fault Tolerance algorithm for transaction validation and utilizes smart contracts to handle account transfers, evaluations, and queries. Through case analysis, it is confirmed that the proposed integration of the particle swarm optimization-K-means method can simultaneously achieve low false-positive rates and high detection rates. Experimental results demonstrate that the anomaly detection algorithm in this paper effectively screens out abnormal data from on-chain charging data.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】vehicle-to-grid; electric vehicles; k-means algorithm; anomaly detection

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1093/ijlct/ctae266

How Digital Transformation Drives the Value Enhancement of SMTEs from the Perspective of Technology, Business and Social Interaction

【Author】 Ren, Zongqiang Liu, Qinghan

【影响因子】2.935

【主题类别】

--

【Abstract】The use of digital technologies, such as big data, cloud computing, blockchain and artificial intelligence, has facilitated the growth of the digital economy. Such technologies and their associated data have become crucial production factors for modern enterprises. For small and medium-sized technological enterprises (SMTEs), the challenge is to seize the opportunities brought about by the digital revolution and achieve leapfrog development in the global value chain. However, few studies investigated enterprise digital value creation. This study selects 404 Chinese SMTEs undergoing digital transformation and employs the technology-business-society (TBS) theoretical framework and necessary condition analysis and fuzzy set qualitative comparative analysis methods from a configuration perspective to examine how six TBS-level factors, namely, basic technology application, data practice application, media attention, business credit, social responsibility and organisational resilience, interconnect and drive SMTE digital transformation value. Findings show that none of the six factors alone can adequately increase SMTE value. Rather, a combination of conditions with various configurations can increase enterprise value through digital transformation. Moreover, four configurations can increase value, namely, technology-business collaboration driven, technology led, technology-society-business balanced development and business-society collaboration driven. This study analyses the value configuration of non-high-value SMTEs undergoing digital transformation and finds that insufficient digital technology, media attention and social responsibility can hinder value enhancement. This study contributes to the literature by offering insights into the effect mechanism of digital transformation on enterprise value and providing practical guidance to Chinese SMTEs in optimising their digital transformation and enhancing their value.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital transformation; Enterprise value; Prerequisite analysis (NCA); Fuzzy set qualitative comparative analysis (fsQCA); TBS theory

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s11205-025-03522-z

Decentralized autonomous organization in built environments: applications, potential and limitations

【Author】 Ly, Reachsak Shojaei, Alireza

【影响因子】2.775

【主题类别】

--

【Abstract】The operations of built environment-related sectors are often run on centralized organizational structures. This centralized approach could lead to operational challenges that restrict efficiency, hinder transparency, and misalign with the community's interests. The emergence of decentralized autonomous organization (DAO) presents a promising avenue for addressing these issues by leveraging blockchain technology and decentralized governance models. This paper presents a review of DAO, examining its existing applications, limitations, and potential use cases in the built environment. Seven categories of DAO applications in the built environment were identified and discussed. The study also explores DAO's fundamentals, including its governance characteristics, operational mechanism, limitations and technical implementation, and corresponding challenges. Finally, this study highlights three potential areas in the built environment for future DAO use cases. This article serves as an essential reference for future academics, professionals, and policy regulators interested in learning more about the integrations of DAO in the built environment.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Decentralized autonomous organization; Smart contract; Construction industry; Built environment

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s10257-025-00699-1

Artificial intelligence and blockchain in clinical trials: enhancing data governance efficiency, integrity, and transparency

【Author】 Leiva, Victor Castro, Cecilia

【影响因子】2.695

【主题类别】

--

【Abstract】This article examines the transformative potential of blockchain technology and its integration with artificial intelligence (AI) in clinical trials, focusing on their combined ability to enhance integrity, operational efficiency, and transparency in the data governance. Through an in-depth analysis of recent advancements, the article highlights how blockchain and AI address critical challenges, including patient data privacy, regulatory compliance, and security. The article also identifies key barriers to adoption in the mentioned integration, such as scalability limitations, association with existing healthcare systems, and high implementation costs. By presenting a comprehensive overview of the current research and proposing strategic directions, this work emphasizes how the synergy between blockchain and AI can revolutionize clinical trials through process automation, improved stakeholder trust, and robust transparency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】AI; blockchain technology; data integrity; data privacy; governance; interoperability; operational efficiency; regulatory compliance; smart contracts

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1080/17576180.2025.2452774

Privacy-Preserving Approach to Edge Federated Learning Based on Blockchain and Fully Homomorphic Encryption

【Author】 Deng, Yun Guo, Baiqi Chen, Shouxue

【影响因子】2.690

【主题类别】

--

【Abstract】To address the issues of high single-point failure risk, weak privacy protection, and poor resistance to poisoning attacks in edge federated learning, an edge federated learning privacy protection scheme based on blockchain and fully homomorphic encryption is proposed. This scheme uses blockchain technology combined with the CKKS (Cheon-Kim-Kim-Song) fully homomorphic encryption scheme to encrypt computational parameters. This approach reduces the risk of privacy leakage and provides edge federated learning with features such as anti-tampering, resistance to single-point failure, and data traceability. In addition, an unsupervised mechanism for identifying model gradient parameter updates is designed. This mechanism uses the consistency of historical model gradient parameter updates from edge servers as the identification basis. It can effectively detect malicious updates from edge servers, improving the accuracy of the aggregated model. Experimental results show that the proposed method can resist poisoning attacks from 70% of malicious edge servers. It offers privacy protection, transparent model aggregation, and resistance to single-point failure. Furthermore, the method achieves high model accuracy and meets stringent security, accuracy, and traceability requirements in edge federated learning scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】edge federated learning; blockchain; the CKKS fully homomorphic encryption; unsupervised model gradient parameter update identification mechanism; privacy preservation

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.3390/electronics14020361

Integrating smart contracts into the modeling paradigm to harness the potential of models

【Author】 Gomez-Macias, Cristian Perez-Blanco, Francisco Javier Granada, David Vara, Juan Manuel

【影响因子】2.211

【主题类别】

--

【Abstract】Despite the increasing interest in blockchain and smart contracts, their inherent complexity has impeded widespread adoption. In order to mitigate this issue, this work introduces SmaC, a model-based framework for the development of smart contracts in Solidity that enables the treatment of contracts as models, opening up new possibilities for their enhancement and maintenance. A key benefit of SmaC is its ability to impose a development pattern, which contributes to improved code quality and reduced vulnerabilities. The framework's effectiveness is evaluated through several case studies, showing how model-driven engineering can mitigate contracts inherent complexity and promote better collaboration between developers and domain experts. As this work will demonstrate, when smart contracts are treated as models, a vast array of possibilities unfolds.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Model-driven engineering; Domain-specific languages; Smart contracts

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s10270-024-01260-3

Adapting to new technologies: A systematic literature review of blockchain implementation in academic libraries

【Author】 Kanyika, Martin Elihaki Sadykova, Raikhan Tuenbaeva, Kalima Chuwa, Lucilla

【影响因子】2.079

【主题类别】

--

【Abstract】Blockchain technology (BT), despite being relatively new, is gaining significant attention in academic libraries owing to its unique features. This study aims to justify why academic libraries should adopt BT for certain sensitive functions over existing technologies or systems. The study utilized the SALSA framework and adhered to PRISMA criteria to systematically review literature on the implementation of BT in academic libraries. Six authoritative databases namely Scopus, Web of Science, ResearchGate, Refseek, Google Scholar, and Crossref were employed. Initially, 71 articles were retrieved from these databases. After removing duplicates and unrelated articles, 27 were included for synthesis. The findings indicate that most articles were authored by scholars in Asia and Africa, highlighting a significant interest in adopting new technologies in libraries among researchers in developing countries despite facing challenges such as limited skilled staff, financial constraints, and inadequate technological infrastructure compared to developed countries. The findings reveal a steady increase in the number of published articles on BT each year, with a significant contribution from authoritative publishers. The study also highlights the many benefits BT can bring to academic libraries, such as enhancing data security, increasing transparency, fostering collaboration both within and between libraries, and facilitating technological innovation and access control. The study concludes that BT holds great potential for academic libraries, offering benefits that surpass existing systems and significantly improving service delivery. As a result, the study strongly recommends adopting BT in academic libraries to enhance efficiency and effectiveness. For successful implementation, it is essential to provide comprehensive training to library staff on how to apply BT within the library context, as this is a relatively new concept in the education sector, particularly for libraries. Furthermore, library management should ensure a supportive infrastructure, including sufficient budget allocation, to cover the costs associated with the adoption and utilization of BT.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; academic libraries; systematic literature review; implementation; adoption of blockchain

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1177/02666669241312153

Novel quantum voting protocol for four-particle entangled states based on superdense coding

【Author】 Zhang, Hao-Wen Xu, Guang-Bao Jiang, Dong-Huan

【影响因子】1.965

【主题类别】

--

【Abstract】We propose a novel quantum voting protocol that utilizes superdense coding of four-particle entangled states. The protocol is simultaneously legitimate, anonymous, blind, verifiable and irreducible. In order to prevent malicious tampering of the public content, we introduce the distributed proof of work (PoW) consensus algorithm in blockchain as a database mechanism for voting participants. The voting protocol utilizes four-particle entangled states as a quantum resource to perform only single-particle operations, as well as GHZ basis measurements and |0 >,|1 >\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ | 0 \rangle ,| 1\rangle \right\} $$\end{document}-basis measurements. This means that our protocol can be successfully implemented using existing quantum information processing techniques. We conduct simulation experiments on the proposed voting protocol on the IBM Qiskit platform, and the results show that it is correct and feasible.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Quantum voting; Superdense coding; Unitary operator; Four-particle entangled states

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1007/s11128-025-04663-3

Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax

【Author】 Brechlin, Alexander Schaefer, Jochen Armknecht, Frederik

【影响因子】1.914

【主题类别】

--

【Abstract】Cryptocurrency exchanges have become a multi-billion dollar industry. Although these platforms are not only relevant for economic reasons but also from a privacy and legal perspective, empirical studies investigating the operations of cryptocurrency exchanges and the behavior of their users are surprisingly rare. A notable exception is a study analyzing the cryptocurrency exchange ShapeShift. While this study described new heuristics to retrieve a significant fraction of trades made on the plaform, its approach relied on identifying cryptocurrency transactions based on previously scraped trade data. This limited the analysis to the timeframe for which data had been acquired and likely led to false negatives in the transaction identification process. In this paper, we replicate and extend previous work by conducting an in-depth investigation of the cryptocurrency exchange Evonax. Our analysis is based on actual trading data acquired by using a novel methodology allowing to extract detailed information from the public blockchain and the interface of the exchange platform. We are able to identify 30,402 transactions between the launch of Evonax in February 2018 and December 31, 2022, which should be close to a complete set of all transactions. This allows us not only to analyze the business practices of a cryptocurrency exchange but also to identify a number of interesting use cases that are likely to be associated with illegal activity. This paper is an extended version of a research article previously accepted at the CryptoEx Workshop at IEEE ICBC 2024.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain privacy; cryptocurrency exchanges; cryptocurrency forensics

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1002/nem.2325

Mixed effects models for extreme value index regression

【Author】 Momoki, Koki Yoshida, Takuma

【影响因子】0.863

【主题类别】

--

【Abstract】Extreme value theory (EVT) provides an elegant mathematical tool for the statistical analysis of rare events. When data are collected from multiple population subgroups, because some subgroups may have less data available for extreme value analysis, a scientific interest of many researchers would be to improve the estimates obtained directly from each subgroup. To achieve this, we incorporate the mixed effects model (MEM) into the regression technique in EVT. In small area estimation, the MEM has attracted considerable attention as a primary tool for producing reliable estimates for subgroups with small sample sizes, i.e., "small areas." The key idea of MEM is to incorporate information from all subgroups into a single model and to borrow strength from all subgroups to improve estimates for each subgroup. Using this property, in extreme value analysis, the MEM may contribute to reducing the bias and variance of the direct estimates from each subgroup. This prompts us to evaluate the effectiveness of the MEM for EVT through theoretical studies and numerical experiments, including its application to the risk assessment of a number of stocks in the cryptocurrency market.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Extreme value index regression; extreme value theory; mixed effects model; Pareto-type distribution; risk assessment

【发表时间】2025

【收录时间】2025-04-09

【文献类型】

【DOI】 10.1080/03610926.2025.2450769

在线标注

备案号: 苏ICP备17025947号-5

评论回复