Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826 - 29 January 2024

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331 - 28 December 2022

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287 - 17 August 2022

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization… More >

  • Open Access

    ARTICLE

    IDV: Internet Domain Name Verification Based on Blockchain

    Ning Hu1, Yu Teng2, Yan Zhao1, Shi Yin1, Yue Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 299-322, 2021, DOI:10.32604/cmes.2021.016839 - 24 August 2021

    Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification… More >

  • Open Access

    ARTICLE

    Blockzone: A Decentralized and Trustworthy Data Plane for DNS

    Ning Hu1, Shi Yin1, Shen Su1, *, Xudong Jia1, Qiao Xiang2, Hao Liu3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1531-1557, 2020, DOI:10.32604/cmc.2020.010949 - 20 August 2020

    Abstract The domain name system (DNS) provides a mapping service between memorable names and numerical internet protocol addresses, and it is a critical infrastructure of the Internet. The authenticity of DNS resolution results is crucial for ensuring the accessibility of Internet services. Hundreds of supplementary specifications of protocols have been proposed to compensate for the security flaws of DNS. However, DNS security incidents still occur frequently. Although DNS is a distributed system, for a specified domain name, only authorized authoritative servers can resolve it. Other servers must obtain the resolution result through a recursive or iterative… More >

  • Open Access

    ARTICLE

    Research on Architecture of Risk Assessment System Based on Block Chain

    Yang Zhao1, Shibin Zhang1,*, Min Yang1, Peilin He1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 677-686, 2019, DOI:10.32604/cmc.2019.05936

    Abstract The risk assessment system has been applied to the information security, energy, medical and other industries. Through the risk assessment system, it is possible to quantify the possibility of the impact or loss caused by an event before or after an event, thereby avoiding the risk or reducing the loss. However, the existing risk assessment system architecture is mostly a centralized architecture, which could lead to problems such as data leakage, tampering, and central cheating. Combined with the technology of block chain, which has the characteristics of decentralization, security and credibility, collective maintenance, and untamperability. More >

Displaying 1-10 on page 1 of 6. Per Page