Kumar et al., 2023 - Google Patents
A review on double spending problem in blockchainKumar et al., 2023
- Document ID
- 16597473332018433275
- Author
- Kumar A
- Sah B
- Mehrotra T
- Rajput G
- Publication year
- Publication venue
- 2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)
External Links
Snippet
The double-spending problem in blockchain technology is a significant challenge that threatens the integrity and trustworthiness of decentralized systems. This problem occurs when a user attempts to spend the same cryptocurrency unit twice, leading to a situation …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Butijn et al. | Blockchains: a systematic multivocal literature review | |
| Ren et al. | Interoperability in blockchain: A survey | |
| Kumar et al. | A review on double spending problem in blockchain | |
| Gao et al. | A survey of blockchain: Techniques, applications, and challenges | |
| Ohize et al. | Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges | |
| Ramotsoela et al. | Attack detection in water distribution systems using machine learning | |
| Liu et al. | Distributed ledger technology | |
| Mosakheil | Security threats classification in blockchains | |
| Dilley et al. | Strong federations: An interoperable blockchain solution to centralized third-party risks | |
| WO2021058298A1 (en) | Consensus protocol for blockchain dag structure | |
| Jani | Smart contracts: Building blocks for digital transformation | |
| Chaudhry et al. | Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm | |
| Putz et al. | Trust factors and insider threats in permissioned distributed ledgers: An analytical study and evaluation of popular dlt frameworks | |
| Swarnkar et al. | Security, privacy, trust management and performance optimization of blockchain technology | |
| Reshi et al. | The blockchain conundrum: An in‐depth examination of challenges, contributing technologies, and alternatives | |
| Al-Ghuraybi et al. | Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems | |
| How et al. | Blockchain-enabled searchable encryption in clouds: a review | |
| Kaushik | Blockchain enabled artificial intelligence for cybersecurity systems | |
| Yakubu et al. | A Systematic Literature Review on Blockchain Consensus Mechanisms' Security: Applications and Open Challenges. | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| Tan-Vo et al. | Optimizing academic certificate management with blockchain and machine learning: A novel approach using optimistic rollups and fraud detection | |
| Zheng et al. | BSHUNTER: Detecting and tracing defects of bitcoin scripts | |
| Darvishi et al. | Blockchain technology and vulnerability exploits on smart contracts | |
| Bhoi et al. | Future Digital Identity Management with Quantum Secure Blockchain | |
| Kumar et al. | Blockchain technology and applications |