Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Taxonomy of centralization in public blockchain systems: A systematic literature review
Bitcoin introduced delegation of control over a monetary system from a select few to all who
participate in that system. This delegation is known as the decentralization of controlling …
participate in that system. This delegation is known as the decentralization of controlling …
Cryptocurrency wallet: A review
A blockchain is a growing list of records, called blocks, that are linked using cryptography.
Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual …
Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual …
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives
S Quamara, AK Singh - Computers & Security, 2022 - Elsevier
Cryptocurrencies are emerging as virtual financial systems based on their innovative
decentralized and distributed strategy in order to provide astonishing capabilities across a …
decentralized and distributed strategy in order to provide astonishing capabilities across a …
[HTML][HTML] Vulnerability of blockchain technologies to quantum attacks
Quantum computation represents a threat to many cryptographic protocols in operation
today. It has been estimated that by 2035, there will exist a quantum computer capable of …
today. It has been estimated that by 2035, there will exist a quantum computer capable of …
[HTML][HTML] Blockchain side implementation of pure wallet (pw): An offline transaction architecture
This article proposes an electronic payment architecture named Pure Wallet (PW), which
extends the concept of Blockchain cryptocurrency for offline transactions. The process is …
extends the concept of Blockchain cryptocurrency for offline transactions. The process is …
Security aspects of cryptocurrency wallets—a systematic literature review
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …
Recommender systems in cybersecurity
L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
SoK: Design, vulnerabilities and defense of cryptocurrency wallets
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
[KSIĄŻKA][B] Квантово-устойчивый блокчейн
А Петренко - 2023 - books.google.com
Сегодня мы наблюдаем рост внимания к технологии блокчейн и распределенного
реестра (англ.-Distributed Ledger Technology, DLT), которая является одной из …
реестра (англ.-Distributed Ledger Technology, DLT), которая является одной из …
Horus: A security assessment framework for android crypto wallets
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …
transactions and keep track of funds. However, if these apps are not adequately protected …