[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zaghloul et al., 2020 - Google Patents

Bitcoin and blockchain: Security and privacy

Zaghloul et al., 2020

View PDF
Document ID
2062434471892447089
Author
Zaghloul E
Li T
Mutka M
Ren J
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

Blockchain is a technology that was proposed to enable the decentralized digital currency, Bitcoin. Since its inception, blockchain has been widely used in many other areas, including tracing sensor data and mitigating its duplication in IoT applications, the healthcare industry …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction

Similar Documents

Publication Publication Date Title
Zaghloul et al. Bitcoin and blockchain: Security and privacy
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
Zhang et al. Security and privacy on blockchain
Iqbal et al. Exploring sybil and double-spending risks in blockchain systems
Judmayer et al. Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
Zheng et al. Blockchain challenges and opportunities: A survey
Tschorsch et al. Bitcoin and beyond: A technical survey on decentralized digital currencies
Conti et al. A survey on security and privacy issues of bitcoin
Puddu et al. $\mu $ chain: How to Forget without Hard Forks
Karame et al. Bitcoin and blockchain security
Mosakheil Security threats classification in blockchains
Barber et al. Bitter to better—how to make bitcoin a better currency
Bonneau et al. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
Kroll et al. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
Hellani et al. On blockchain technology: Overview of bitcoin and future insights
Panda et al. Bitcoin and blockchain: history and current applications
Sharma et al. Cryptocurrency mechanisms for blockchains: models, characteristics, challenges, and applications
Gayvoronskaya et al. Blockchain
Islam et al. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency
Gao et al. Secure, fair and instant data trading scheme based on bitcoin
Li et al. Silentdelivery: Practical timed-delivery of private information using smart contracts
Clark et al. Research perspectives and challenges for bitcoin and cryptocurrencies
Li et al. Cryptoeconomics: Economic Mechanisms Behind Blockchains
EhabZaghloul et al. Bitcoin and blockchain: Security and privacy
Gencer On scalability of blockchain technologies