Добірка наукової літератури з теми "Anonymity of transactions in blockchain"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Anonymity of transactions in blockchain".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Anonymity of transactions in blockchain"
AlTawy, Riham, and Guang Gong. "Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 149–69. http://dx.doi.org/10.2478/popets-2019-0041.
Повний текст джерелаAl-Qerem, Ahmad. "Using raft as consensus algorithm for blockchain application of roaming services for mobile network." International Journal Artificial Intelligent and Informatics 3, no. 1 (April 1, 2022): 42–52. http://dx.doi.org/10.33292/ijarlit.v3i1.46.
Повний текст джерелаDavid, Shibin, Jaspher W. Kathrine, K. Martin Sagayam, and Krit Salahddine. "Augmenting integrity and scalability in mobile payment applications using blockchain." E3S Web of Conferences 297 (2021): 01063. http://dx.doi.org/10.1051/e3sconf/202129701063.
Повний текст джерелаRecabarren, Ruben, and Bogdan Carbunar. "Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 207–26. http://dx.doi.org/10.2478/popets-2022-0011.
Повний текст джерелаHuang, Shanyun, Wenyin Zhang, Xiaomei Yu, Jiuru Wang, Wanshui Song, and Bei Li. "Covert Communication Scheme Based on Bitcoin Transaction Mechanism." Security and Communication Networks 2021 (December 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/3025774.
Повний текст джерелаAn, Qi, Yanhui Zhang, Chong Guo, Ximing Liu, Junjia Huang, Wenzhan Zhang, Shijun Zhang, Chao Zhan, and Yuxiang Cai. "Anonymous Traceability Protocol Based on Group Signature for Blockchain." Security and Communication Networks 2022 (March 23, 2022): 1–10. http://dx.doi.org/10.1155/2022/4559119.
Повний текст джерелаMuftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.
Повний текст джерелаSon, Ye-Byoul, Jong-Hyuk Im, Hee-Yong Kwon, Seong-Yun Jeon, and Mun-Kyu Lee. "Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption." Energies 13, no. 6 (March 12, 2020): 1321. http://dx.doi.org/10.3390/en13061321.
Повний текст джерелаDubina, V. V., and R. V. Oliynykov. "Methods and means of deanonymization of transactions in blockchain." Radiotekhnika, no. 207 (December 24, 2021): 52–58. http://dx.doi.org/10.30837/rt.2021.4.207.04.
Повний текст джерелаNyamtiga, Sicato, Rathore, Sung, and Park. "Blockchain-Based Secure Storage Management with Edge Computing for IoT." Electronics 8, no. 8 (July 25, 2019): 828. http://dx.doi.org/10.3390/electronics8080828.
Повний текст джерелаДисертації з теми "Anonymity of transactions in blockchain"
Бещук, Андрій Андрійович. "Аналіз загроз при повторному використанні налаштування у протоколі GRO-16". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/34490.
Повний текст джерелаQualification work consists of: 63 pages, 1 picture, 0 tables, 15 sources. Goal of this work is analysis of vulnerabilities zero knowledge proof protocols zk-SNARK type GRO-16 and conditions, in which those vulnerabilities are critical. The object of this research is process of protection personal data while performing transactions in the blockchain. The subject of this research is attacks on personal data protection protocol in blockchain subject to reuse setup. The SETUP stage of zero knowledge proof protocols zk-SNARK type was considered step by step and setup constricting algorithms were developed. Vulnerabilities of generation setup parallelization were analyzed and five types of attack on protocol GRO-16 were developed. They are based on the human factor and the conspiracy of several participants. Also, strategies have been developed to protect against the attacks described in this work, both algorithmic and using third-party devices.
Lawal, Yusuf Lanre. "Anomaly Detection in Ethereum Transactions Using Network Science Analytics." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin159585057190135.
Повний текст джерелаBattaglia, Bruno. "Simulation of Bitcoin Transactions to Identify Money Laundering Activities." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24249/.
Повний текст джерелаTimander, Terese. "Using Blockchain Technology to Improve Security of Financial Transactions - a Design Proposal." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272995.
Повний текст джерелаBlockchainteknik är ett relativt nytt forskningsområde, omgivet av ett stort intresse tack vare de möjligheter tekniken för med sig i termer av ökad säkerhet. Det här arbetet kommer betrakta blockchainteknik såsom det appliceras inom den finansiella industrin. Mer specifikt så resulterar det här projektet i konstruktionen av ett beslutsstödssystem. Detta beslutsstödssystem kommer vara en produkt, likt en miniräknare, vilken banker och andra finansiella institutioner kommer kunna använda sig av om de beslutat implementera blockchainteknik. Således kommer detta projekt resultera i en färdig produkt, detta innefattar dock även att en analys kommer presenteras gällande vilka algoritmer och protokoll som är bäst lämpade för ett dylikt beslutsstödssystem. Ä ven en kommentar gällande de juridiska förutsättningarna kommer inkluderas. Slutligen presenteras resultaten som fås vid användande av den färdiga produkten, liksom en analys av systemets kvalitet och användbarhet.
Löf, Marcus. "Decentralized Transactions in a Centralized Environment : A Blockchain Study Within the Transport Industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210042.
Повний текст джерелаBlockchainteknologin utgör ett område där mycket forskning utförs. Teknologin revolutionerade världen genom kryptovalutan Bitcoin, och sedan dess har nya applikationer av teknologin växt fram. En av applikationerna är att representera verkliga tillgångar som digitala tillgångar på en blockchain, så kallad smart-property. I denna uppsats används smart-property för att lösa kreditvärdighetsproblem som finns inom transportindustrin. En implementation för att påvisa konceptets ändamålsenlighet utförs där smart-property används genom colored coins på Bitcoins blockchain. För att kunna bedöma användbarheten hos lösningen, föreslås även två alternativa lösningar för jämförelse. Krav för en lösning på problemet specificeras i uppsatsen och lösningarna evalueras mot dessa. Alltså undersöker och jämför denna uppsats lösningarnas förmåga att lösa kreditvärdighetsproblemet som motiverar denna uppsats. Aspekterna för evaluering utgörs av: konfidentialitet, integritet, tillgänglighet, konsistens, oförändlighet, responstid, kundnytta, pålitlighet och miljöpåverkan. Slutsatsen som dras är att en lösning baserad på smart-property är adekvat för problemet. Lösningen har dock brister, främst vad gäller konfidentialitet, som däremot inte påverkar problemdomänen.
Johansson, Tom, and Viktor Charpentier. "Blockchain database; technical background and a reconnaissance on an implementation within the banking industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211075.
Повний текст джерелаDalmasso, Loïc. "De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.
Повний текст джерелаThe Internet of Things (IoT) is a global infrastructure, aiming to connect any systems of various kinds, to generate new services. While this hyperconnectivity offers many opportunities in many areas (e.g. health, industry, energy, etc.), its deployment represents a major challenge in terms of security and privacy. The use of cryptography becomes essential, particularly to ensure the confidentiality of data. Nevertheless, classical algorithms such as AES are not designed to be embedded in systems with limited resources, such as connected devices. To address this issue, the scientific community is moving towards so-called "lightweight" cryptography. Despite this term, to what extent is it relevant and in line with the resources of the connected objects ? What level of security can it achieve ?Through common metrics, the objective of the first axis of this thesis is to determine the gains of lightweight cryptography compared to the classical one, in terms of size, performance and robustness against side channel analysis, recognized as a major attack vector. This evaluation focuses on the AES- 128 standard and its close lightweight derivatives PRESENT-80/128 and more recent GIFT-64- 128/GIFT-128-128, whose bit-level oriented structure favours hardware implementation. In terms of performances, GIFT-64-128 is positioned as the best alternative, with a reduction in size by almost a factor of 10, for a 58% gain in efficiency over AES-128. In terms of resistance against side channel analysis, CPA in this thesis, lightweight cryptography is once again proving its worth, with PRESENT-128 achieving an increased robustness by a factor of 3 compared to AES-128.Although indispensable, confidentiality alone is not enough to create a secure environment. Facing the emergence of cyber attacks, an IoT ecosystem has to integrate security mechanisms to deal with various threats. In addition, its network topology is becoming conducive to decentralization for efficiency reasons. Without central organization, how can the reliability and security of a highly heterogeneous environment be ensured ?The second part of this thesis proposes a trust protocol, specifically designed for IoT. Inspired by the blockchain concept, several optimizations have been implemented, allowing to reduce the use of resources to a minimum. In an approach centered on network gateways, the results show a reduction in storage space by a factor of 3 000 compared to Bitcoin, as well as a latency divided by 18, for a consumption lower than that of a smartphone charger. Finally, an extension of the protocol is proposed to be embedded in objects. The model focuses on the trust assessment in a close environment, that means on entities where direct communication is possible. With less than 400 bytes, the protocol is capable of evaluating the trust of about ten objects, and up to thirty with only 1 KB
Larsson, Kihlgren Tobias, and Björn Sterner. "New Kids On The Block chain : En kartläggning om svenska bankers syn på blockkedjeteknologin och dess potentiella användningsområden." Thesis, Linköpings universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151038.
Повний текст джерелаBackground: The interest for the first cryptocurrency in the world made the world caught the attention of the technology behind Bitcoin: Blockchain. Blockchain can be described as a decentralized database with no central part controlling its network. Instead, all transactions are registered and verified by the members of the network. This enables digital information to be distributed but not copied in a trustworthy way. The technology therefore has the possibility to create trust between parties that normally does not trust each other and is for that reason considered to have the potential to make many industries, including the banking industry more effective. Amongst a number of financial players that investigate the possible opportunities the technology have for improving their products and services, the optimism is high. Purpose: The purpose of this study is to research which potential fields of application Swedish banks sees for Blockchain and how the technology could be used by the banking industry. The study also intend to analyze the effects the usage of the technology would have on transactions within the Swedish banking industry. Completion: A qualitative research method characterize the study. The empirical data has been collected through a selected sample focused on individuals with knowledge and experience within the field. Conclusion: The study identifies KYC, Smart Contracts and Transactions as potential fields of application for the Swedish banking industry. In particular, KYC was highlighted as an area where the Blockchain technology could help improve managing the personal information of the customer. The study also points out trade finance and interbank-transactions as attractive areas of possible use for the technology. Furthermore, the result of the study shows that the technology should not be seen as a threat against banks role as an intermediary but a technology that enables the banks services to become more efficient. The technology is to be seen as an Emerging technology with high uncertainty today and where the potential impact lays in the future. The biggest threats against an implementation of the technology are that the technology still is in an experimental phase and the shortage of common standards and rules between banks and across countries.
Drozda, Tomáš. "Forenzní analýza sítě Bitcoin." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255465.
Повний текст джерелаLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Повний текст джерелаProjektet ämnar lösa problemen med oförnekbarhet, integritet och konfidentialitet när man delar känsligt data mellan parter som behöver lita på varandra utan inblanding av betrodd tredje part. Detta diskuteras för att besvara till vilken omfattning digitala resurser kan delas säkert i ett decentraliserat system baserat på publika liggare jämfört med existerande tillitsbaserade alternativ. En undersökning av nuvarande resursdelningslösningar visar att det existerar många tillitsbaserade system men även en växande andel lösningar baserade på publika liggare. En intressant lösning som lyfts fram är Storj som använder sådan teknologi men fokuserar på resurslagring mer är delning. Projektets föreslagna lösning, kallad SecuRES, är ett kommunikationsprotokoll baserat på en publik liggare likt Bitcoin. En prototyp baserad på protokollet har tagits fram som visar att det är möjligt att dela krypterade filer med en eller flera mottagare genom ett decentraliserat nätverk baserat på publika liggare. Slutsatsen som dras är att SecuRES klarar sig utan betrodda tredje parter för att dela resurser medan vissa operationer kan göras mer användarvänliga genom externa autentiseringstjänster. Själva lösningen garanterar integritet av data och medför ytterligare fördelar såsom oförnekbarhet, konfidentialitet och hög transparens då man kan göra källkoden och protocoldokumentation fritt läsbar utan att utsätta systemet för fara. Vidare forskning behövs för att undersöka om systemet kan skalas upp för allmän användning och alltjämt bibehålla säkerhets- samt prestandakrav.
Книги з теми "Anonymity of transactions in blockchain"
Maldonado, Fatima Castiglione. Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner. Packt Publishing, 2018.
Знайти повний текст джерелаParkin, Jack. Money Code Space. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197515075.001.0001.
Повний текст джерелаWatt, Gary. Equity & Trusts Law Directions. 7th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.
Повний текст джерелаЧастини книг з теми "Anonymity of transactions in blockchain"
Sakalauskas, Eligijus, and Ausrys Kilciauskas. "Blockchain Based Cryptocurrency Transaction Data and Balance Anonymity Improvement." In Communications in Computer and Information Science, 160–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88304-1_13.
Повний текст джерелаHellwig, Daniel, Goran Karlic, and Arnd Huchzermeier. "Privacy and Anonymity." In Build Your Own Blockchain, 99–121. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40142-9_5.
Повний текст джерелаDrescher, Daniel. "Authorizing Transactions." In Blockchain Basics, 103–9. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2604-9_13.
Повний текст джерелаDrescher, Daniel. "Verifying and Adding Transactions." In Blockchain Basics, 153–64. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2604-9_18.
Повний текст джерелаElrom, Elad. "Bitcoin Wallets and Transactions." In The Blockchain Developer, 121–71. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4847-8_4.
Повний текст джерелаSummers, Akira. "Coins and transactions." In Understanding Blockchain and Cryptocurrencies, 79–97. New York: CRC Press, 2022. http://dx.doi.org/10.1201/9781003187165-6.
Повний текст джерелаKarkeraa, Shilpa. "Aspects of Blockchain Transactions." In Unlocking Blockchain on Azure, 81–90. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5043-3_3.
Повний текст джерелаChaurasia, Brijesh Kumar, Shekhar Verma, and Geetam Singh Tomar. "Intersection Attack on Anonymity in VANET." In Transactions on Computational Science XVII, 133–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35840-1_7.
Повний текст джерелаButijn, Bert-Jan, Willem-Jan van den Heuvel, and Indika Kumara. "Smart Contract-Driven Business Transactions." In Essentials of Blockchain Technology, 81–98. Boca Raton : CRC Press, [2020]: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429674457-4.
Повний текст джерелаDeters, Ralph. "How to Detect and Contain Suspicious Transactions in Distributed Ledgers." In Smart Blockchain, 149–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05764-0_16.
Повний текст джерелаТези доповідей конференцій з теми "Anonymity of transactions in blockchain"
Pospiech, Piotr, Aleksander Marianski, and Michal Kedziora. "Blockchain Decentralized Voting for Verified Users with a Focus on Anonymity." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110805.
Повний текст джерелаDalal, Siddhartha, Zihe Wang, and Siddhanth Sabharwal. "Identifying Ransomware Actors in the Bitcoin Network." In 2nd International Conference on Machine Learning, IOT and Blockchain (MLIOB 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111201.
Повний текст джерелаBergquist, Jonatan, Aron Laszka, Monika Sturm, and Abhishek Dubey. "On the design of communication and transaction anonymity in blockchain-based transactive microgrids." In Middleware '17: 18th International Middleware Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3152824.3152827.
Повний текст джерелаZola, Francesco, Maria Eguimendia, Jan Lukas Bruse, and Raul Orduna Urrutia. "Cascading Machine Learning to Attack Bitcoin Anonymity." In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019. http://dx.doi.org/10.1109/blockchain.2019.00011.
Повний текст джерелаShrestha, Ajay Kumar, and Julita Vassileva. "Bitcoin Blockchain Transactions Visualization." In 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB). IEEE, 2018. http://dx.doi.org/10.1109/iccbb.2018.8756455.
Повний текст джерелаDos Santos, Saulo, Chukwuka Chukwuocha, Shahin Kamali, and Ruppa K. Thulasiram. "An Efficient Miner Strategy for Selecting Cryptocurrency Transactions." In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019. http://dx.doi.org/10.1109/blockchain.2019.00024.
Повний текст джерелаCaprolu, Maurantonio, Matteo Pontecorvi, Matteo Signorini, Carlos Segarra, and Roberto Di Pietro. "Analysis and Patterns of Unknown Transactions in Bitcoin." In 2021 IEEE International Conference on Blockchain (Blockchain). IEEE, 2021. http://dx.doi.org/10.1109/blockchain53845.2021.00031.
Повний текст джерелаEck, Dylan, Adam Torek, Steven Cutchin, and Gaby G. Dagher. "Diffusion: Analysis of Many-to-Many Transactions in Bitcoin." In 2021 IEEE International Conference on Blockchain (Blockchain). IEEE, 2021. http://dx.doi.org/10.1109/blockchain53845.2021.00061.
Повний текст джерелаHao Wei, Suping Huang, Gaizhen Yi, and Zhenglong Xie. "An anonymity improvement scheme of Secure Electronic Transactions protocols." In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icacte.2010.5579629.
Повний текст джерелаLee, YongJoo, and Keon Myung Lee. "Blockchain-based RBAC for user authentication with anonymity." In RACS '19: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3338840.3355673.
Повний текст джерелаЗвіти організацій з теми "Anonymity of transactions in blockchain"
Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Повний текст джерелаDecentralising transactions with the Blockchain (ITA dossier no. 30en, November 2017). Vienna: self, 2018. http://dx.doi.org/10.1553/ita-doss-030en.
Повний текст джерела