[HTML][HTML] Taxonomy of centralization in public blockchain systems: A systematic literature review

AR Sai, J Buckley, B Fitzgerald, A Le Gear - Information Processing & …, 2021 - Elsevier
Bitcoin introduced delegation of control over a monetary system from a select few to all who
participate in that system. This delegation is known as the decentralization of controlling …

Cryptocurrency wallet: A review

S Suratkar, M Shirole, S Bhirud - 2020 4th international …, 2020 - ieeexplore.ieee.org
A blockchain is a growing list of records, called blocks, that are linked using cryptography.
Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual …

A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives

S Quamara, AK Singh - Computers & Security, 2022 - Elsevier
Cryptocurrencies are emerging as virtual financial systems based on their innovative
decentralized and distributed strategy in order to provide astonishing capabilities across a …

[HTML][HTML] Vulnerability of blockchain technologies to quantum attacks

JJ Kearney, CA Perez-Delgado - Array, 2021 - Elsevier
Quantum computation represents a threat to many cryptographic protocols in operation
today. It has been estimated that by 2035, there will exist a quantum computer capable of …

[HTML][HTML] Blockchain side implementation of pure wallet (pw): An offline transaction architecture

IS Igboanusi, KP Dirgantoro, JM Lee, DS Kim - ICT Express, 2021 - Elsevier
This article proposes an electronic payment architecture named Pure Wallet (PW), which
extends the concept of Blockchain cryptocurrency for offline transactions. The process is …

Security aspects of cryptocurrency wallets—a systematic literature review

S Houy, P Schmid, A Bartel - ACM Computing Surveys, 2023 - dl.acm.org
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …

Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arxiv preprint arxiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

[KSIĄŻKA][B] Квантово-устойчивый блокчейн

А Петренко - 2023 - books.google.com
Сегодня мы наблюдаем рост внимания к технологии блокчейн и распределенного
реестра (англ.-Distributed Ledger Technology, DLT), которая является одной из …

Horus: A security assessment framework for android crypto wallets

MS Uddin, M Mannan, A Youssef - … 2021, Virtual Event, September 6–9 …, 2021 - Springer
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …