Zaghloul et al., 2020 - Google Patents
Bitcoin and blockchain: Security and privacyZaghloul et al., 2020
View PDF- Document ID
- 2062434471892447089
- Author
- Zaghloul E
- Li T
- Mutka M
- Ren J
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Blockchain is a technology that was proposed to enable the decentralized digital currency, Bitcoin. Since its inception, blockchain has been widely used in many other areas, including tracing sensor data and mitigating its duplication in IoT applications, the healthcare industry …
- 238000005065 mining 0 abstract description 95
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zaghloul et al. | Bitcoin and blockchain: Security and privacy | |
Wu et al. | A comprehensive survey of blockchain: From theory to IoT applications and beyond | |
Zhang et al. | Security and privacy on blockchain | |
Iqbal et al. | Exploring sybil and double-spending risks in blockchain systems | |
Judmayer et al. | Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms | |
Zheng et al. | Blockchain challenges and opportunities: A survey | |
Tschorsch et al. | Bitcoin and beyond: A technical survey on decentralized digital currencies | |
Conti et al. | A survey on security and privacy issues of bitcoin | |
Puddu et al. | $\mu $ chain: How to Forget without Hard Forks | |
Karame et al. | Bitcoin and blockchain security | |
Mosakheil | Security threats classification in blockchains | |
Barber et al. | Bitter to better—how to make bitcoin a better currency | |
Bonneau et al. | Sok: Research perspectives and challenges for bitcoin and cryptocurrencies | |
Kroll et al. | The economics of Bitcoin mining, or Bitcoin in the presence of adversaries | |
Hellani et al. | On blockchain technology: Overview of bitcoin and future insights | |
Panda et al. | Bitcoin and blockchain: history and current applications | |
Sharma et al. | Cryptocurrency mechanisms for blockchains: models, characteristics, challenges, and applications | |
Gayvoronskaya et al. | Blockchain | |
Islam et al. | A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency | |
Gao et al. | Secure, fair and instant data trading scheme based on bitcoin | |
Li et al. | Silentdelivery: Practical timed-delivery of private information using smart contracts | |
Clark et al. | Research perspectives and challenges for bitcoin and cryptocurrencies | |
Li et al. | Cryptoeconomics: Economic Mechanisms Behind Blockchains | |
EhabZaghloul et al. | Bitcoin and blockchain: Security and privacy | |
Gencer | On scalability of blockchain technologies |