[go: up one dir, main page]

Kumar et al., 2023 - Google Patents

A review on double spending problem in blockchain

Kumar et al., 2023

Document ID
16597473332018433275
Author
Kumar A
Sah B
Mehrotra T
Rajput G
Publication year
Publication venue
2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)

External Links

Snippet

The double-spending problem in blockchain technology is a significant challenge that threatens the integrity and trustworthiness of decentralized systems. This problem occurs when a user attempts to spend the same cryptocurrency unit twice, leading to a situation …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Butijn et al. Blockchains: a systematic multivocal literature review
Ren et al. Interoperability in blockchain: A survey
Kumar et al. A review on double spending problem in blockchain
Gao et al. A survey of blockchain: Techniques, applications, and challenges
Ohize et al. Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges
Ramotsoela et al. Attack detection in water distribution systems using machine learning
Liu et al. Distributed ledger technology
Mosakheil Security threats classification in blockchains
Dilley et al. Strong federations: An interoperable blockchain solution to centralized third-party risks
WO2021058298A1 (en) Consensus protocol for blockchain dag structure
Jani Smart contracts: Building blocks for digital transformation
Chaudhry et al. Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
Putz et al. Trust factors and insider threats in permissioned distributed ledgers: An analytical study and evaluation of popular dlt frameworks
Swarnkar et al. Security, privacy, trust management and performance optimization of blockchain technology
Reshi et al. The blockchain conundrum: An in‐depth examination of challenges, contributing technologies, and alternatives
Al-Ghuraybi et al. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems
How et al. Blockchain-enabled searchable encryption in clouds: a review
Kaushik Blockchain enabled artificial intelligence for cybersecurity systems
Yakubu et al. A Systematic Literature Review on Blockchain Consensus Mechanisms' Security: Applications and Open Challenges.
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Tan-Vo et al. Optimizing academic certificate management with blockchain and machine learning: A novel approach using optimistic rollups and fraud detection
Zheng et al. BSHUNTER: Detecting and tracing defects of bitcoin scripts
Darvishi et al. Blockchain technology and vulnerability exploits on smart contracts
Bhoi et al. Future Digital Identity Management with Quantum Secure Blockchain
Kumar et al. Blockchain technology and applications