Blockchain

Calculations to compute the expected Bitcoin transaction efficiency (measured in transactions per block) using CRYSTALS-Dilithium vs using Elliptic Curve Digital Signature Algorithm (ECDSA).
- Categories:

Change address identification is one of the difficulties in bitcoin address clustering as an emerging social computing problem. Most of the current related research only applies to certain specific types of transactions and faces the problems of low recognition rate and high false positive rate. We innovatively propose a clustering method based on multi-conditional recognition of one-time change addresses and conduct experiments with on-chain bitcoin transaction data. The results show that the proposed method identifies at least 12.3\% more one-time change addresses than other heuristics.
- Categories:

The dataset contains development archives of more or less interesting conversations, announcements, discussions, presentations and so on regarding consensus changes in Bitcoin.
- Categories:

The primary article search was carried out by using selected keywords. These keywords were jointly selected by the authors, with criteria that were based on the frequently used authors' keywords found in most of the related articles. For example, the list of keywords such as “blockchain” combined with “education”, or “lifelong learning” or “life-long learning” or “digital certificate” or “academic record” or “e-learning” was used to conduct the search.
- Categories:
This dataset is an experimental result of the paper “Performance Evaluation for Geographically Distributed Blockchain-based Services in a Cloud Computing Environment”. The Geographically Distributed Cloud Performance Evaluation Ambassador (GDCPEA) is deployed on each Go Ethereum (Geth) node to measure the elapsed time from the start to the end of the Geth main operations.
- Categories:
What is a Blockchain?
Merriam-Webster dictionary defines blockchain as,
A digital database containing information (such as records of financial transactions) that can be simultaneously used and shared within a large decentralized, publicly accessible network.
6 Types of Attacks on Blockchain
1. 51% Attacks (Sybil Attacks)
2. Double Spending Attacks
3. Routing Attacks
4. Private Key Security Attacks
5. Selfish Mining Attacks
6. Vulnerable Smart Contacts
- Categories:

<p>This is <span style="font-family: Verdana, Arial, Helvetica, sans-serif;">Charlotte street netowrk data.</span></p>
- Categories:
Today, more and more Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks deployed in scenarios with irregular or unreliable Internet connectivity.
- Categories:

This dataset accompanies the paper titled CHASM: A Blockchain Software design pattern. It contains results of the performance tests on two different architectures, and the accompanying analytics source code that presents their comparison.
The .csv files are the result files. The .dta files are the stata equivalent, and the .do files are the Stata analysis files which analyses this dataset and outputs the .jpg images.
- Categories:

In order to explore the possible drawbacks of a blockchain-based system for data management for nuclear Power Plant inspections, a simulator has been implemented to recreate the scenario of an inspection. The results contain execution times, source code and instructions to deploy de simulator
- Categories: