Blockchain ecosystem—Technological and management opportunities and challenges

KKR Choo, S Ozcan, A Dehghantanha… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Blockchain is increasingly deployed in a broad range of sectors, ranging from banking and
finance to manufacturing to energy to transportation, and so on. While many technological …

Differential privacy in blockchain technology: A futuristic approach

MU Hassan, MH Rehmani, J Chen - Journal of Parallel and Distributed …, 2020 - Elsevier
Blockchain has received a widespread attention because of its decentralized, tamper-proof,
and transparent nature. Blockchain works over the principle of distributed, secured, and …

Attacks against cross-chain systems and defense approaches: A contemporary survey

L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …

A Comprehensive Survey on Green Blockchain: Develo** the Next Generation of Energy Efficient and Sustainable Blockchain Systems

TM Fernández-Caramés, P Fraga-Lamas - arxiv preprint arxiv …, 2024 - arxiv.org
Although Blockchain has been successfully used in many different fields and applications, it
has been traditionally regarded as an energy-intensive technology, essentially due to the …

Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications

D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks

AS Yahaya, N Javaid, S Zeadally, H Farooq - Vehicular Communications, 2022 - Elsevier
In the study, we propose a double blockchain based vehicular system for optimizing data
storage and securing communication in Internet of Vehicles (IoV) networks. We propose an …

The paradigm logic of blockchain governance

S ** - Technology in Society, 2024 - Elsevier
Blockchain technology is mainly composed of public-key cryptography, hash algorithms and
consensus mechanisms. Blockchain solves the two trust problems inherent in human …

MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain

B Yu, L Feng, H Zhu, F Qiu, J Wan, S Yao - Peer-to-Peer Networking and …, 2023 - Springer
The trusted interaction of on-chain and off-chain data is an important foundation for large-
scale applications of blockchain systems. When the blockchain system processes massive …

A new message expansion structure for full pipeline SHA-2

Y Zhang, Z He, M Wan, M Zhan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Once there are constant or infrequently changed bits (COIBs) in two adjacent input
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …