Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    REVIEW

    Computer Modeling Approaches for Blockchain-Driven Supply Chain Intelligence: A Review on Enhancing Transparency, Security, and Efficiency

    Puranam Revanth Kumar1, Gouse Baig Mohammad2, Pallati Narsimhulu3, Dharnisha Narasappa4, Lakshmana Phaneendra Maguluri5, Subhav Singh6,7,8, Shitharth Selvarajan9,10,11,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 2779-2818, 2025, DOI:10.32604/cmes.2025.066365 - 30 September 2025

    Abstract Blockchain Technology (BT) has emerged as a transformative solution for improving the efficacy, security, and transparency of supply chain intelligence. Traditional Supply Chain Management (SCM) systems frequently have problems such as data silos, a lack of visibility in real time, fraudulent activities, and inefficiencies in tracking and traceability. Blockchain’s decentralized and irreversible ledger offers a solid foundation for dealing with these issues; it facilitates trust, security, and the sharing of data in real-time among all parties involved. Through an examination of critical technologies, methodology, and applications, this paper delves deeply into computer modeling based-blockchain framework… More >

  • Open Access

    REVIEW

    Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization

    Saha Reno1,#,*, Koushik Roy2,#

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2061-2119, 2025, DOI:10.32604/cmc.2025.066366 - 03 July 2025

    Abstract The blockchain trilemma—balancing decentralization, security, and scalability—remains a critical challenge in distributed ledger technology. Despite significant advancements, achieving all three attributes simultaneously continues to elude most blockchain systems, often forcing trade-offs that limit their real-world applicability. This review paper synthesizes current research efforts aimed at resolving the trilemma, focusing on innovative consensus mechanisms, sharding techniques, layer-2 protocols, and hybrid architectural models. We critically analyze recent breakthroughs, including Directed Acyclic Graph (DAG)-based structures, cross-chain interoperability frameworks, and zero-knowledge proof (ZKP) enhancements, which aim to reconcile scalability with robust security and decentralization. Furthermore, we evaluate the trade-offs More >

  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826 - 29 January 2024

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331 - 28 December 2022

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287 - 17 August 2022

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization… More >

  • Open Access

    ARTICLE

    IDV: Internet Domain Name Verification Based on Blockchain

    Ning Hu1, Yu Teng2, Yan Zhao1, Shi Yin1, Yue Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 299-322, 2021, DOI:10.32604/cmes.2021.016839 - 24 August 2021

    Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification… More >

  • Open Access

    ARTICLE

    Blockzone: A Decentralized and Trustworthy Data Plane for DNS

    Ning Hu1, Shi Yin1, Shen Su1, *, Xudong Jia1, Qiao Xiang2, Hao Liu3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1531-1557, 2020, DOI:10.32604/cmc.2020.010949 - 20 August 2020

    Abstract The domain name system (DNS) provides a mapping service between memorable names and numerical internet protocol addresses, and it is a critical infrastructure of the Internet. The authenticity of DNS resolution results is crucial for ensuring the accessibility of Internet services. Hundreds of supplementary specifications of protocols have been proposed to compensate for the security flaws of DNS. However, DNS security incidents still occur frequently. Although DNS is a distributed system, for a specified domain name, only authorized authoritative servers can resolve it. Other servers must obtain the resolution result through a recursive or iterative… More >

  • Open Access

    ARTICLE

    Research on Architecture of Risk Assessment System Based on Block Chain

    Yang Zhao1, Shibin Zhang1,*, Min Yang1, Peilin He1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 677-686, 2019, DOI:10.32604/cmc.2019.05936

    Abstract The risk assessment system has been applied to the information security, energy, medical and other industries. Through the risk assessment system, it is possible to quantify the possibility of the impact or loss caused by an event before or after an event, thereby avoiding the risk or reducing the loss. However, the existing risk assessment system architecture is mostly a centralized architecture, which could lead to problems such as data leakage, tampering, and central cheating. Combined with the technology of block chain, which has the characteristics of decentralization, security and credibility, collective maintenance, and untamperability. More >

Displaying 1-10 on page 1 of 8. Per Page