Academic literature on the topic 'Permissionless Blockchain'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Permissionless Blockchain.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Permissionless Blockchain"
Zhang, Xiaohui, Mingying Xue, and Xianghua Miao. "A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain." Wireless Communications and Mobile Computing 2022 (August 26, 2022): 1–21. http://dx.doi.org/10.1155/2022/8698009.
Full textCerezo Sánchez, David. "Pravuil: Global Consensus for a United World." FinTech 1, no. 4 (October 31, 2022): 325–44. http://dx.doi.org/10.3390/fintech1040025.
Full textAgarwal, Rachit, Tanmay Thapliyal, and Sandeep Shukla. "Analyzing Malicious Activities and Detecting Adversarial Behavior in Cryptocurrency based Permissionless Blockchains: An Ethereum Usecase." Distributed Ledger Technologies: Research and Practice 1, no. 2 (December 10, 2022): 1–21. http://dx.doi.org/10.1145/3549527.
Full textHeo, Hwanjo, and Seungwon Shin. "Understanding Block and Transaction Logs of Permissionless Blockchain Networks." Security and Communication Networks 2021 (August 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/9549602.
Full textHelliar, Christine V., Louise Crawford, Laura Rocca, Claudio Teodori, and Monica Veneziani. "Permissionless and permissioned blockchain diffusion." International Journal of Information Management 54 (October 2020): 102136. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102136.
Full textSeira, Amber, Jeffrey Allen, Cy Watsky, and Richard Alley. "Governance of Permissionless Blockchain Networks." FEDS Notes, no. 2024-02-09 (February 2024): None. http://dx.doi.org/10.17016/2380-7172.3443.
Full textBezuidenhout, Riaan, Wynand Nel, and Jacques Maritz. "Defining Decentralisation in Permissionless Blockchain Systems." African Journal of Information and Communication (AJIC), no. 29 (July 3, 2022): 1–24. http://dx.doi.org/10.23962/ajic.i29.14247.
Full textGrodzicka, Hanna, Michal Kedziora, and Lech Madeyski. "Cloud Solutions for Private Permissionless Blockchain Deployment." Computing and Informatics 40, no. 4 (2021): 880–96. http://dx.doi.org/10.31577/cai_2021_4_880.
Full textMATTILA, VILMA, PRATEEK DWIVEDI, PRATIK GAURI, and MD AHBAB. "HOMOMORPHIC ENCRYPTION IN 5IRE BLOCKCHAIN." International Journal of Social Sciences and Management Review 05, no. 02 (2022): 264–76. http://dx.doi.org/10.37602/ijssmr.2022.5219.
Full textLuo, Bin, and Changlin Yang. "AeRChain: An Anonymous and Efficient Redactable Blockchain Scheme Based on Proof-of-Work." Entropy 25, no. 2 (February 1, 2023): 270. http://dx.doi.org/10.3390/e25020270.
Full textDissertations / Theses on the topic "Permissionless Blockchain"
Harz, Dominik. "Trust and verifiable computation for smart contracts in permissionless blockchains." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209430.
Full textBlockchains adresserar tillit genom kryptografi och konsensus. Bitcoin är den första digitala valutan utan betrodda agenter. Ethereum utökar denna teknik genom att möjliggöra agenter i blockchain, via smart contracts. En systemisk förtroende modell för smart contracts i blockchains saknas emellertid. Denna avhandling beskriver ekosystemet för smarta kontrakt som ett öppet multi-agent system. En förtroendemodell introducerar social kontroll genom inlåning och granskningsagenter. Tillitrelaterade attribut kvantifieras i 2,561 smart contracts från GitHub. De använder ett medelvärde av tre variabler och funktioner med en av tio som har en säkerhetsre-laterad fråga. Dessutom blockchains begränsa beräkningsuppgifter. Att lösa dessa begränsningar samtidigt som du behåller förtroendet kräver kontrollerbar beräkning. En algoritm för verifierbar beräkning utvecklas och implementeras i Solidity. Den använder en arbiter som tillämpar algoritmen, computation services som tillhandahåller och verifierar lösningar och en judge som bedömer lösningar. Experiment utförs med 1000 iterationer för en till sex verifierare med en snyggare sannolikhet för 30%, 50% och 70%. Algoritmen visar linjär komplexitet för heltalsmultiplicering. Verifieringen beror på fuskans tidigare sannolikhet och antal verifierare. I experimenten är sex verifierare tillräckliga för att detektera alla cheaters för de tre tidigare sannolikheterna.
Khacef, Kahina. "Trade-off betweew security and scalability in blockchain systems." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS516.
Full textThe development of Blockchain has enabled the emergence of high technology in the sensitive and active sectors by allowing the reliability of information via consensus, the immutability of records, and transaction transparency. This thesis presents the design, implementation, and evaluation of techniques to scale the blockchain. The first part of this thesis consists of building a decentralized, secure peer-to-peer messaging protocol using a PKI-based blockchain, which can be an email, a website, or some other form of message. Managing users’ identities by the Blockchain eliminates the single point of failure of traditional PKIs. By using smart contracts to validate, store and revoke the certificate on a public blockchain. Security and scalability are considered two significant challenges in blockchains’ rapid and smooth deployment in businesses, enterprises, and organizations. The ability to scale up a blockchain lies mainly in improving the underlying technology rather than deploying new hardware. The second contribution of the thesis proposes SecuSca, an approach that makes a trade-off between security and scalability when designing blockchain-based systems. It designs an efficient replication model, which creates dynamic sharding wherein blocks are stored in various nodes. To maintain the required level of security, the proposed approach shows that blockchain replication over the Peer_to_Peer network is minimized as the blockchain’s length evolves. Furthermore, a sharding protocol over the network is proposed to get access to the blockchain data based on historical transactions. The protocol reduces old blocks’ replication; these blocks can be discarded from specific nodes and stored by others. The nodes willing to store the coming blocks and their data are chosen randomly. The block header of each block is kept to achieve consensus. Next, we optimize the latest approach by choosing the entering nodes following the nodes’ capacities instead of randomly
Kendric, Hood A. "Improving Cryptocurrency Blockchain Security and Availability Adaptive Security and Partitioning." Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1595038779436782.
Full textNeudecker, Till [Verfasser], and H. [Akademischer Betreuer] Hartenstein. "Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains / Till Neudecker ; Betreuer: H. Hartenstein." Karlsruhe : KIT-Bibliothek, 2019. http://d-nb.info/1174992239/34.
Full textBooks on the topic "Permissionless Blockchain"
Allende, Marcos. LACChain Framework for Permissioned Public Blockchain Networks: From Blockchain Technology to Blockchain Networks. Edited by Alejandro Pardo and Marcelo Da Silva. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003747.
Full textEinfluss der Blockchain-Technologie auf Geschäftsmodelle: Entwicklung eines Vorgehensmodells am Beispiel von intermediären Akteuren. Göttingen, Deutschland: Cuvillier Verlag, 2021.
Find full textBook chapters on the topic "Permissionless Blockchain"
Gans, Joshua. "Permissioned Versus Permissionless." In The Economics of Blockchain Consensus, 51–67. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33083-4_4.
Full textBezuidenhout, Riaan, Wynand Nel, and Jacques Maritz. "Transient Random Number Seeds in Permissionless Blockchain Systems." In The Transdisciplinary Reach of Design Science Research, 85–96. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06516-3_7.
Full textAguru, Aswani Devi, Suresh Babu Erukala, and Ilaiah Kavati. "Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain." In Hybrid Intelligent Systems, 625–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96305-7_58.
Full textMessias, Johnnatan, Vabuk Pahari, Balakrishnan Chandrasekaran, Krishna P. Gummadi, and Patrick Loiseau. "Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains." In Financial Cryptography and Data Security, 221–40. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47751-5_13.
Full textGrodzicka, Hanna, Michal Kedziora, and Lech Madeyski. "Security and Scalability in Private Permissionless Blockchain: Problems and Solutions Leading to Creating Consent-as-a-Service (CaaS) Deployment." In Advances in Computational Collective Intelligence, 278–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88113-9_22.
Full textLu, Yuan, Qiang Tang, and Guiling Wang. "Generic Superlight Client for Permissionless Blockchains." In Computer Security – ESORICS 2020, 713–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59013-0_35.
Full textAgrawal, Divyakant, Amr El Abbadi, Mohammad Javad Amiri, Sujaya Maiyya, and Victor Zakhary. "Blockchains and Databases: Opportunities and Challenges for the Permissioned and the Permissionless." In Advances in Databases and Information Systems, 3–7. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54832-2_1.
Full textBeris, Themis, and Manolis Koubarakis. "Modeling and Preserving Greek Government Decisions Using Semantic Web Technologies and Permissionless Blockchains." In The Semantic Web, 81–96. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93417-4_6.
Full textGarilli, Chiara. "Blockchain and Smart Contracts." In Handbook of Research on Applying Emerging Technologies Across Multiple Disciplines, 159–75. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8476-7.ch009.
Full textWalch, Angela. "Deconstructing “Decentralization”." In Cryptoassets, 39–68. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190077310.003.0003.
Full textConference papers on the topic "Permissionless Blockchain"
Giacobino, Andrea, David Grierson, Har Preet Singh, Patrick McHale, and Simon Maggs. "Cosmos Cash: Public Permissionless approach towards SSI and Use Cases." In 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00071.
Full textThai, Quang Tung, Jong-Chul Yim, and Sun-Me Kim. "A scalable semi-permissionless blockchain framework." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939962.
Full textDeuber, Dominic, Bernardo Magri, and Sri Aravinda Krishnan Thyagarajan. "Redactable Blockchain in the Permissionless Setting." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00039.
Full textHao, Nan. "Ticket Market Design Based on Permissionless Blockchain." In 2018 IEEE 2nd International Conference on Circuits, System and Simulation (ICCSS). IEEE, 2018. http://dx.doi.org/10.1109/cirsyssim.2018.8525886.
Full textMoriyama, Koichi, and Akira Otsuka. "Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors." In 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00012.
Full textErsoy, Oguzhan, Zhijie Ren, Zekeriya Erkin, and Reginald L. Lagendijk. "Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms." In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018. http://dx.doi.org/10.1109/cvcbt.2018.00008.
Full textFalazi, Ghareeb, Michael Hahn, Uwe Breitenbucher, Frank Leymann, and Vladimir Yussupov. "Process-Based Composition of Permissioned and Permissionless Blockchain Smart Contracts." In 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2019. http://dx.doi.org/10.1109/edoc.2019.00019.
Full textXu, Jie, Yingying Cheng, Cong Wang, and Xiaohua Jia. "Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain." In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00065.
Full textXu, Jie, Yingying Cheng, Cong Wang, and Xiaohua Jia. "Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain." In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00065.
Full textNi, Zhengwei, Wenbo Wang, Dong In Kim, Ping Wang, and Dusit Niyato. "Evolutionary Game for Consensus Provision in Permissionless Blockchain Networks with Shards." In ICC 2019 - 2019 IEEE International Conference on Communications (ICC). IEEE, 2019. http://dx.doi.org/10.1109/icc.2019.8761130.
Full textReports on the topic "Permissionless Blockchain"
Gans, Joshua, and Hanna Halaburda. "Zero Cost'' Majority Attacks on Permissionless Blockchains. Cambridge, MA: National Bureau of Economic Research, July 2023. http://dx.doi.org/10.3386/w31473.
Full text