Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security aspects of cryptocurrency wallets—a systematic literature review
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …
[HTML][HTML] Blockchain technology and related security risks: Towards a seven-layer perspective and taxonomy
S Mollajafari, K Bechkoum - Sustainability, 2023 - mdpi.com
Blockchain technology can be a useful tool to address issues related to sustainability. From
its initial foundation based on cryptocurrency to the development of smart contracts …
its initial foundation based on cryptocurrency to the development of smart contracts …
An ensemble learning method for Bitcoin price prediction based on volatility indicators and trend
Predicting the price of Bitcoin poses a challenge for researchers, merchants, traders and
investors alike. This paper delves into the analysis of a Bitcoin price and volume dataset …
investors alike. This paper delves into the analysis of a Bitcoin price and volume dataset …
Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
[HTML][HTML] Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …
decentralized manner. It allows identity owners to manage and store their digital identities in …
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets
Cryptocurrency wallets, acting as fundamental infrastructure to the blockchain ecosystem,
have seen significant user growth, particularly among browser-based wallets (ie, browser …
have seen significant user growth, particularly among browser-based wallets (ie, browser …
Perceptions of distributed ledger technology key management-an interview study with finance professionals
Key management is an integral part of using distributed ledger technology (DLT). Previous
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …
Towards an improved taxonomy of attacks related to digital identities and identity management systems
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
An empirical analysis of security and privacy risks in android cryptocurrency wallet apps
A cryptocurrency wallet app is a piece of software that manages, stores, and generates
private keys of cryptocurrency accounts. With the provision of services such as easy access …
private keys of cryptocurrency accounts. With the provision of services such as easy access …
Horus: A security assessment framework for android crypto wallets
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …
transactions and keep track of funds. However, if these apps are not adequately protected …