" Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets

Y Yu, T Sharma, S Das, Y Wang - … of the 2024 CHI Conference on …, 2024 - dl.acm.org
Cryptocurrency wallets come in various forms, each with unique usability and security
features. Through interviews with 24 users, we explore reasons for selecting wallets in …

“I Can't Believe It's Not Custodial!”: Usable Trustless Decentralized Key Management

T Sharma, VC Nair, H Wang, Y Wang… - Proceedings of the 2024 …, 2024 - dl.acm.org
Key management has long remained a difficult unsolved problem in the field of usable
security. While password-based key derivation functions (PBKDFs) are widely used to solve …

Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs)

T Sharma, Y Potter, K Pongmala, H Wang… - ar** PET DApp Using Blockchain Based Technology
M Shakila - 2024 International Conference on IoT Based …, 2024 - ieeexplore.ieee.org
The use of blockchain technology has disrupted many industries, including finance,
healthcare, and logistics. However, the use cases for blockchain technology are not limited …

Picoin Wallet Portfolio Optimization

R Jain, M Karoley, A Bichpuriya… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
The research paper presents the comprehensive development of a Pi-Coin wallet,
integrating blockchain, MetaMask, React, Solidity, and Python libraries to provide robust …

How NFT Collectors Experience Online NFT Communities: A Case Study of Bored Ape

A Sinnott, KZ Zhou - arxiv preprint arxiv:2309.09320, 2023 - arxiv.org
Non-fungible tokens (NFTs) are unique cryptographic assets representing the ownership of
digital media. NFTs have soared in popularity and trading prices. However, there exists a …

[PDF][PDF] Diseño de un modulo para la autenticación usando datos biometricos en un entorno descentralizado

E Barrios Ruiz, DA Garzon Bejarano - 2024 - repository.udistrital.edu.co
Los sistemas de autenticación basados en el uso de nombres de usuario y contraseña no
son suficientemente seguros, ya que no se puede verificar que la persona que utiliza estos …