Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access


    Introduction to the Special Issue on Blockchain Security

    Zhihong Tian1, Yanhui Guo2, Shen Su1,*, Hui Lu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 5-7, 2023, DOI:10.32604/cmes.2022.025097

    Abstract This article has no abstract. More >

  • Open Access


    Enhancing Blockchain Security Using Ripple Consensus Algorithm

    A. Baseera1, Abeer Abdullah Alsadhan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538

    Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches in the distributed network. This… More >

  • Open Access


    Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications

    Shi-Cho Cha1, Chuang-Ming Shiung1, Wen-Wei Li1, Chun-Neng Peng1, Yi-Hsuan Hung1, Kuo-Hui Yeh2,3,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2731-2755, 2022, DOI:10.32604/cmc.2022.029161

    Abstract As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications… More >

  • Open Access


    Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain

    Xiajiong Shen1,3, Shuaimin Jiang2,3, Lei Zhang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1069-1085, 2021, DOI:10.32604/cmes.2021.015736

    Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More >

Displaying 1-10 on page 1 of 4. Per Page  

Share Link

WeChat scan