Blockchain

Calculations to compute the expected Bitcoin transaction efficiency (measured in transactions per block) using CRYSTALS-Dilithium vs using Elliptic Curve Digital Signature Algorithm (ECDSA). 

Categories:
107 Views

Change address identification is one of the difficulties in bitcoin address clustering as an emerging social computing problem. Most of the current related research only applies to certain specific types of transactions and faces the problems of low recognition rate and high false positive rate. We innovatively propose a clustering method based on multi-conditional recognition of one-time change addresses and conduct experiments with on-chain bitcoin transaction data. The results show that the proposed method identifies at least 12.3\% more one-time change addresses than other heuristics.

Categories:
122 Views

The dataset contains development archives of more or less interesting conversations, announcements, discussions, presentations and so on regarding consensus changes in Bitcoin.

 

Categories:
40 Views

The primary article search was carried out by using selected keywords. These keywords were jointly selected by the authors, with criteria that were based on the frequently used authors' keywords found in most of the related articles. For example, the list of keywords such as “blockchain” combined with “education”, or “lifelong learning” or “life-long learning” or “digital certificate” or “academic record” or “e-learning” was used to conduct the search. 

Categories:
99 Views

This dataset is an experimental result of the paper “Performance Evaluation for Geographically Distributed Blockchain-based Services in a Cloud Computing Environment”. The Geographically Distributed Cloud Performance Evaluation Ambassador (GDCPEA) is deployed on each Go Ethereum (Geth) node to measure the elapsed time from the start to the end of the Geth main operations.

Categories:
565 Views

What is a Blockchain?

Merriam-Webster dictionary defines blockchain as,

A digital database containing information (such as records of financial transactions) that can be simultaneously used and shared within a large decentralized, publicly accessible network.

 

6 Types of Attacks on Blockchain

1. 51% Attacks (Sybil Attacks)

2. Double Spending Attacks

3. Routing Attacks

4. Private Key Security Attacks

5. Selfish Mining Attacks

6. Vulnerable Smart Contacts

 

Categories:
654 Views

<p>This is&nbsp;<span style="font-family: Verdana, Arial, Helvetica, sans-serif;">Charlotte street netowrk data.</span></p>

Categories:
126 Views

Today, more and more Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks deployed in scenarios with irregular or unreliable Internet connectivity.

Categories:
256 Views

This dataset accompanies the paper titled CHASM: A Blockchain Software design pattern. It contains results of the performance tests on two different architectures, and the accompanying analytics source code that presents their comparison.

The .csv files are the result files. The .dta files are the stata equivalent, and the .do files are the Stata analysis files which analyses this dataset and outputs the .jpg images.

Categories:
197 Views

In  order  to  explore  the  possible  drawbacks  of  a blockchain-based  system  for  data  management for nuclear Power Plant inspections,  a  simulator  has been implemented to recreate the scenario of an inspection. The results contain execution times, source code and instructions to deploy de simulator 

Categories:
171 Views

Pages