期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Multi-platform wallet for privacy protection and key recovery in decentralized applications
1
作者 Cristòfol Daudén-Esmel Jordi Castellà-Roca +1 位作者 Alexandre Viejo Ignacio Miguel-Rodríguez 《Blockchain(Research and Applications)》 2025年第1期54-77,共24页
In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engag... In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engage with dApps,users require a blockchain wallet.This tool facilitates the generation and secure storage of a user’s private key and verfies their identity,among other functionalities.Despite their utility,blockchain wallets present significant challenges,such as reliance on trusted third parties,vulnerability to adversaries observing and potentially linking user interactions,key recovery issues,and synchronization of cryptographic keys across multiple devices.This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System(IPFS)technologies for managing asymmetric keys and enabling key recovery.This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage.The proposed system is economically viable,with in-depth cost analysis,and demonstrates resilience against security and privacy attacks.A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions.Finally,a preliminary prototype implementation is presented to validate the system’s feasibility. 展开更多
关键词 decentralized applications Crypto wallet Smart contract Key recovery Security PRIVACY
原文传递
An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps)
2
作者 Noama Fatima Samreen Manar H.Alalfi 《Blockchain(Research and Applications)》 EI 2023年第2期28-40,共13页
The Ethereum blockchain’s smart contract is a programmable transaction that performs general-purpose computations and can be executed automatically on the blockchain.Leveraging this component,blockchain technology(BT... The Ethereum blockchain’s smart contract is a programmable transaction that performs general-purpose computations and can be executed automatically on the blockchain.Leveraging this component,blockchain technology(BT)has grown beyond the scope of cryptocurrencies and can now be applicable in various industries other than finance.In this paper,we investigated the current trends in Ethereum-based decentralized applications(DApps)to be able to categorize and analyze the DApps to measure the complexity of smart contracts behind them,their level of security and their correlation to the maintainability of the DApps.We leveraged the source code analysis,security analysis,and the developmental metadata of the DApps to infer this correlation.Based on our findings,we concluded that the maintainability of Ethereum DApps is proportional to the code size,number of functions,and,most importantly,the number of outgoing invocations and statements in the smart contracts. 展开更多
关键词 Blockchain technology Ethereum smart contracts Code metrics Software complexity Software security Software maintainability decentralized applications
原文传递
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
3
作者 Nishank P. Kuppa Vijay K. Madisetti 《Journal of Information Security》 2025年第1期197-226,共30页
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont... Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem. 展开更多
关键词 Blockchain Ethereum Smart Contracts Security decentralized applications WEB3 Cryptocurrency Large Language Models
在线阅读 下载PDF
Building a Stronger Foundation for Web3:Advantages of 5G Infrastructure
4
作者 FENG Jianxin PAN Yi WU Xiao 《ZTE Communications》 2024年第2期3-10,共8页
The emergence of Web3 technologies promises to revolutionize the Internet and redefine our interactions with digital assets and applications.This essay explores the pivotal role of 5G infrastructure in bolstering the ... The emergence of Web3 technologies promises to revolutionize the Internet and redefine our interactions with digital assets and applications.This essay explores the pivotal role of 5G infrastructure in bolstering the growth and potential of Web3.By focusing on several crucial aspects—network speed,edge computing,network capacity,security and power consumption—we shed light on how 5G technology offers a robust and transformative foundation for the decentralized future of the Internet.Prior to delving into the specifics,we undertake a technical review of the historical progression and development of Internet and telecommunication technologies. 展开更多
关键词 WEB3 5G blockchain decentralized application INFRASTRUCTURE
在线阅读 下载PDF
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
5
作者 Samir M.Umran Songfeng Lu +1 位作者 Zaid Ameen Abduljabbar Xueming Tang 《Computers, Materials & Continua》 SCIE EI 2023年第3期5389-5416,共28页
There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new ... There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing. 展开更多
关键词 Smart grids industrial IoTs electric power system blockchain technology IoT applications industry 4.0 decentralization applications
在线阅读 下载PDF
Blockchain‑oriented approach for detecting cyber‑attack transactions
6
作者 Zhiqi Feng Yongli Li Xiaochen Ma 《Financial Innovation》 2023年第1期2190-2227,共38页
With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial secu... With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial security has become a top priority with the sustainable development of blockchain-based platforms because of an increasing number of cyber attacks,which have resulted in a huge loss of crypto assets in recent years.Therefore,it is imperative to study the real-time detection of cyber attacks to facilitate effective supervision and regulation.To this end,this paper proposes the weighted and extended isolation forest algorithms and designs a novel framework for the real-time detection of cyber-attack transactions by thoroughly studying and summarizing real-world examples.Furthermore,this study develops a new detection approach for locating the compromised address of a cyber attack to resolve the data scarcity of hack addresses and reduce time consumption.Moreover,three experiments are carried out not only to apply on different types of cyber attacks but also to compare the proposed approach with the widely used existing methods.The results demonstrate the high efficiency and generality of the proposed approach.Finally,the lower time consumption and robustness of our method were validated through additional experiments.In conclusion,the proposed blockchain-oriented approach in this study can handle real-time detection of cyber attacks and has significant scope for applications. 展开更多
关键词 Blockchain Cyber-attack detection Extended isolation forest decentralized application Financial security Fintech
在线阅读 下载PDF
On Time-Aware Cross-Blockchain Data Migration
7
作者 Mengqiu Zhang Qiang Qu +1 位作者 Li Ning Jianping Fan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第6期1810-1820,共11页
With the widespread adoption of blockchain applications, the imperative for seamless data migration among decentralized applications has intensified. This necessity arises from various factors, including the depletion... With the widespread adoption of blockchain applications, the imperative for seamless data migration among decentralized applications has intensified. This necessity arises from various factors, including the depletion of blockchain disk space, transitions between blockchain systems, and specific requirements such as temporal data analysis. To meet these challenges and ensure the sustained functionality of applications, it is imperative to conduct time-aware cross-blockchain data migration. This process is designed to facilitate the smooth iteration of decentralized applications and the construction of a temporal index for historical data, all while preserving the integrity of the original data. In various application scenarios, this migration task may encompass the transfer of data between multiple blockchains, involving movements from one chain to another, from one chain to several chains, or from multiple chains to a single chain. However, the success of data migration hinges on the careful consideration of factors such as the reliability of the data source, data consistency, and migration efficiency. This paper introduces a time-aware cross-blockchain data migration approach tailored to accommodate diverse application scenarios, including migration between multiple chains. The proposed solution integrates a collective mechanism for controlling, executing, and storing procedures to address the complexities of data migration, incorporating elements such as transaction classification and matching. Extensive experiments have been conducted to validate the efficacy of the proposed approach. 展开更多
关键词 blockchain data migration cross-blockchain time-aware multi-chain decentralized applications
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部