Exploring the attack surface of blockchain: A comprehensive survey
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
Exploring the attack surface of blockchain: A systematic overview
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0
Critical infrastructure systems are vital to underpin the functioning of a society and economy.
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …
Sharper: Sharding permissioned blockchains over network clusters
Scalability is one of the main roadblocks to business adoption of blockchain systems.
Despite recent intensive research on using sharding techniques to enhance the scalability of …
Despite recent intensive research on using sharding techniques to enhance the scalability of …
Scalable byzantine consensus via hardware-assisted secret sharing
The surging interest in blockchain technology has revitalized the search for effective
Byzantine consensus schemes. In particular, the blockchain community has been looking for …
Byzantine consensus schemes. In particular, the blockchain community has been looking for …
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
Cloud computing has become an irreversible trend. Together comes the pressing need for
verifiability, to assure the client the correctness of computation outsourced to the cloud …
verifiability, to assure the client the correctness of computation outsourced to the cloud …
Repucoin: Your reputation is your power
Existing proof-of-work cryptocurrencies cannot tolerate attackers controlling more than 50
percent of the network's computing power at any time, but assume that such a condition …
percent of the network's computing power at any time, but assume that such a condition …
Reputation-based byzantine fault-tolerance for consortium blockchain
K Lei, Q Zhang, L Xu, Z Qi - 2018 IEEE 24th international …, 2018 - ieeexplore.ieee.org
The Practical Byzantine Fault Tolerance algorithm (PBFT) has been highly applied in
consortium blockchain systems, however, this kind of consensus algorithm can hardly …
consortium blockchain systems, however, this kind of consensus algorithm can hardly …
Hybrids on steroids: SGX-based high performance BFT
With the advent of trusted execution environments provided by recent general purpose
processors, a class of replication protocols has become more attractive than ever: Protocols …
processors, a class of replication protocols has become more attractive than ever: Protocols …
DAMYSUS: streamlined BFT consensus leveraging trusted components
Recently, streamlined Byzantine Fault Tolerant (BFT) consensus protocols, such as HotStuff,
have been proposed as a means to circumvent the inefficient view-changes of traditional …
have been proposed as a means to circumvent the inefficient view-changes of traditional …