How blockchain technology can benefit marketing: Six pending research areas

A Rejeb, JG Keogh, H Treiblmaier - Frontiers in blockchain, 2020‏ - frontiersin.org
The proliferation of sophisticated e-commerce platforms coupled with mobile applications
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …

[HTML][HTML] Cryptocurrencies in modern finance: a literature review

A Rejeb, K Rejeb, JG Keogh - Etikonomi, 2021‏ - journal.uinjkt.ac.id
The focus on cryptocurrencies in the finance and banking sectors is gaining momentum. In
this paper, we investigate the role of cryptocurrencies in modern finance. We apply a …

Watermarking cryptographic capabilities

A Cohen, J Holmgren, R Nishimaki… - Proceedings of the forty …, 2016‏ - dl.acm.org
A watermarking scheme for programs embeds some information called a mark into a
program while preserving its functionality. No adversary can remove the mark without …

Future cloud systems design: challenges and research directions

A Taherkordi, F Zahid, Y Verginadis, G Horn - IEEE Access, 2018‏ - ieeexplore.ieee.org
Cloud computing has been recognized as the de facto utility computing standard for hosting
and delivering services over the Internet. Cloud platforms are being rapidly adopted by …

Watermarking public-key cryptographic primitives

R Goyal, S Kim, N Manohar, B Waters… - Advances in Cryptology …, 2019‏ - Springer
A software watermarking scheme enables users to embed a message or mark within a
program while preserving its functionality. Moreover, it is difficult for an adversary to remove …

Watermarking PRFs from lattices: stronger security via extractable PRFs

S Kim, DJ Wu - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019‏ - Springer
A software watermarking scheme enables one to embed a “mark”(ie, a message) within a
program while preserving the program's functionality. Moreover, there is an extraction …

Collusion resistant watermarking schemes for cryptographic functionalities

R Yang, MH Au, J Lai, Q Xu, Z Yu - … on the Theory and Application of …, 2019‏ - Springer
A cryptographic watermarking scheme embeds a message into a program while preserving
its functionality. Recently, a number of watermarking schemes have been proposed, which …

Collusion resistant watermarkable PRFs from standard assumptions

R Yang, MH Au, Z Yu, Q Xu - … in Cryptology–CRYPTO 2020: 40th Annual …, 2020‏ - Springer
A software watermarking scheme can embed a message into a program without significantly
changing its functionality. Moreover, any attempt to remove the embedded message in a …

Equip** public-key cryptographic primitives with watermarking (or: A hole is to watermark)

R Nishimaki - Theory of Cryptography: 18th International Conference …, 2020‏ - Springer
Program watermarking enables users to embed an arbitrary string called a mark into a
program while preserving the functionality of the program. Adversaries cannot remove the …

Beyond software watermarking: traitor-tracing for pseudorandom functions

R Goyal, S Kim, B Waters, DJ Wu - … on the Theory and Application of …, 2021‏ - Springer
Software watermarking schemes allow a user to embed an identifier into a piece of code
such that the resulting program is nearly functionally-equivalent to the original program, and …