[HTML][HTML] A survey: Security, transparency, and scalability issues of nft's and its marketplaces

S Bhujel, Y Rahulamathavan - Sensors, 2022 - mdpi.com
Non-fungible Tokens (NFTs) are ownership records stored on a blockchain, and they are
typically digital items such as photos and videos. In many ways, an NFT is like a …

A comprehensive review of the security flaws of hashing algorithms

A Sadeghi-Nasab, V Rafe - Journal of Computer Virology and Hacking …, 2023 - Springer
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …

[HTML][HTML] Financial portfolio optimization with online deep reinforcement learning and restricted stacked autoencoder—DeepBreath

F Soleymani, E Paquet - Expert Systems with Applications, 2020 - Elsevier
The process of continuously reallocating funds into financial assets, aiming to increase the
expected return of investment and minimizing the risk, is known as portfolio management. In …

[HTML][HTML] A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS

C Lepore, M Ceria, A Visconti, UP Rao, KA Shah… - Mathematics, 2020 - mdpi.com
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …

Monitoring and controlling engineering projects with blockchain-based critical chain project management

N Bahnas, K Adel, R Khallaf, A Elhakeem - Automation in Construction, 2024 - Elsevier
Projects in the AEC industry often experience significant schedule delays due to complexity,
inadequate planning, design inconsistencies, resource unavailability, poor resource …

Research on the criteria of cryptographic resistant of continuous encryption algorithms

D Akbarov, S Umarov, M Turdimatov… - E3S Web of …, 2024 - e3s-conferences.org
The article examines the features of the criteria for the strength of continuous encryption
algorithms. The general properties of the models of algorithms of the continuous encryption …

Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges

K Ko, T Jeong, J Woo, JWK Hong - International Journal of …, 2024 - Wiley Online Library
This paper presents a survey of non‐fungible tokens (NFTs), including its history,
technologies, standards, and challenges in their development. An NFT is a unique digital …

Blockchain technology and IoT-edge framework for sharing healthcare services

SA ElRahman, AS Alluhaidan - Soft Computing, 2021 - Springer
Abstract Internet of Things (IoT) can be used in the healthcare sector to exchange patients'
information, but there are many concerns about the privacy and security of the patients' …

Constructing chaos-based hash function via parallel impulse perturbation

H Liu, X Wang, A Kadir - Soft Computing, 2021 - Springer
Secure hash functions, such as SHA-2 and SHA-3, play an important role in cryptography;
however, they are unkeyed and cannot produce the specific hash value with a specified …

Pfdup: Practical fuzzy deduplication for encrypted multimedia data

S Cheng, Z Tang, S Zeng, X Cui, T Li - Journal of Industrial Information …, 2024 - Elsevier
Redundant data wastes cloud storage space, especially the multimedia data which
comprises a large number of similar files and accounts for the majority of cloud storage. To …