Skip to main content
Web 3 Privacy Now_Rome_October 3rd, 2024
    • by 
    •   9  
      Surveillance StudiesPrivate lawSurveillanceWeb 3.0
Decentralised platforms are changing the digital world by working without central authority. This decentralisation gives users more control over their data and reduces censorship, thus creating a more open Internet. Well-known examples,... more
    • by 
    •   4  
      TerrorismCyberspaceZero-Knowledge ProofsCybercrime-Terrorusm
    • by 
    •   5  
      Computer ScienceCloud ComputingData ScienceData Integrity
Block chain technology has surfaced as a transformative influence, revolutionizing the verification and recording of transactions across industries. In to traditional data base systems, presenting a novel approach to database management.... more
    • by  and +1
    •   6  
      CoBrAMCDMBitcoinEthereum
The health insurance industry has been very key in standing in as a source of financial support for those with medical bills. However, the current claims management processes represent a problem because of inefficiency and some of the... more
    • by 
    •   7  
      Artificial IntelligenceDecentralized SystemsArtificial Neural NetworksFraud Detection
Smart contracts have become an integral part of blockchain technology, enabling the execution of self-enforcing agreements without the need for intermediaries. However, their complex nature and inherent code-based vulnerabilities pose... more
    • by 
    •   4  
      Fuzz TestingBlockchain TechnologiesSmart ContractsEthereum Technology
    • by 
    • Blockchain
Efficient procurement systems are crucial for Nigeria's public sector development, ensuring transparency, efficiency, cost-effectiveness, ease of control, and monitoring. However, many eprocurement systems face security concerns and lack... more
    • by  and +1
    •   6  
      Public Key InfrastructureE-ProcurementEncryptionCyber Security
    • by 
    •   2  
      Computer ScienceEmbedded System
The study proposes a DeFi System to provide organization-level ac- countability for real-time crypto-asset transactions, democratizing crowdfunding and financial support by enabling contributors to donate. Recent work in this area has... more
    • by 
    •   6  
      FinanceTransactional AnalysisCrowdfundingCryptocurrency
This in-depth review delves into the complexities of blockchain technology, a groundbreaking innovation that is transforming the digital world by boosting trust, transparency, and efficiency in transactions. The paper examines the core... more
    • by 
    •   3  
      Information TechnologyComputer SecurityBlock-Chain Technology
Today, blockchain technology has become very popular in finance and the private sector, and its practical benefits are clear to everyone. But in the public sector, the situation is different. A key challenge behind the adoption of... more
    • by  and +1
    •   6  
      Public sectorNew Public ManagementElectronic GovernmentBitcoins
Blockchain technology is a decentralized ledger system that finds applications in various domains such as banking, e-governance, and supply chain management. The consensus algorithm plays a crucial role in any blockchain network as it... more
    • by  and +1
    •   6  
      Game TheoryPower SystemConsensusBlockchain
The theme of accounting in blockchain environment has been referenced and theoretically discussed over the last few years in international publications, both of academic and professional nature. However, until today, there are no other... more
    • by 
Blockchain's Hidden Math: A Detailed Look at Cryptographic Hash Functions, Elliptic Curves, and Number Theory.
    • by 
    •   4  
      CryptocurrencyBlockchainsBlockchainBlockchain Technologies
    • by 
    •   4  
      EngineeringTechnologyIGDS Institute for Gender and Development StudiesBlockchain
This article explores the emerging field of decentralized identity solutions, with a focus on self-sovereign identity (SSI) as a transformative approach to digital identity management. It examines the limitations of traditional... more
    • by 
    •   5  
      Privacy enhancing technologiesSelf-Sovereign IdentityVoter Verifiable Paper Audit TrailDecentralized Identifiers
Um problema intrinseco a implementacao de uma rede sem fio: o legado das contas de usuarios antigos, para autenticacao direta dos usuarios, tem uma solucao bastante simples, mas nem tanto obvia. Encontram-se documentacoes contendo as... more
    • by 
    •   2  
      PhysicsHumanities
    • by 
    •   3  
      Peer to PeerEngineering TechnologyBlockchain
Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this nascent technology. In this paper,... more
    • by 
    •   9  
      Computer ScienceGame TheoryCorporate GovernanceIT Governance
Bitcoin's underlying blockchain technology is rapidly rising in popularity as a means to create and manage digital transactions. It's a decentralized, immutable ledger for recording transactions. Many industries, including the Internet of... more
    • by 
    •   4  
      PrivacySecuritySecurity ThreatsBlockchain
Fake products have become a common term in business, especially in the consumer market. Due to the fake products, companies are going through a lot of financial losses, hampering the brand name, and at the end of the day, every day, they... more
    • by 
    •   2  
      BlockchainsBlockchain Technologies
Additionally, I think it's crucial to highlight that these technologies are not just theoretical-they are actively used in blockchain networks like Bitcoin and Ethereum. For example, Bitcoin's proof-of-work system relies on SHA-256, and... more
    • by 
    •   4  
      Elliptic Curve CryptographyBlockchainblockchain securityElliptic Curve Digital Signature Algorithm (ECDSA)
    • by 
    •   9  
      FinanceInternational FinanceBlast and impact engineeringBLAST
The present disclosure is directed to a novel system for using unique device and user identifiers to perform authentication of a user, device, and/or transaction. In particular, the system may use a heterogeneous blockchain system... more
    • by 
    •   4  
      BlockchainsBlockchainDistributed Ledger Technologypermissionless blockchains
The present disclosure is directed to a novel system for using unique device and user identifiers to perform authentication of a user, device, and/or transaction. In particular, the system may use device biometric profiles and/or user... more
    • by 
    •   3  
      AuthenticationCybersecurityTechniques of Password Authentication
    • by 
    •   16  
      MarketingApplied EconomicsSurveyBusiness and Management
This research introduces a novel decentralized storage system implemented through the integration of blockchain technology. The system is manifested in the form of a website developed using React.js, tailwindcss, and MySQL as the backend... more
    • by 
    •   4  
      MySQLDecentralized ControlDocument ManagementBlockchain
The goal of the paper is to design and implement a distributed trust infrastructure, which makes use of the existing Internet Domain Name System (DNS) and its global trust anchor. Since it has high scalability and eases the burden on... more
    • by 
    •   3  
      Computer ScienceInternet of ThingsWireless Sensor Network
    • by 
    •   15  
      EngineeringComputer ScienceTechnologyData Management
    • by 
As a consequence of mass unemployment being the byproduct of COVID-19, people around the world discovered investment in cryptocurrency as a means to tackle their declining financial condition. Subsequently, the prominence of Ethereum as a... more
    • by 
    •   4  
      Machine LearningFraud DetectionTransactionsEthereum
Читая известную книгу Эдмунда Тейлора Уиттекера «История теорий эфира и электричества», мне пришло в голову, а что если то, что мы называем в научном понимании «энергия» назвать другим словом? Словом, как мне показалось более подходящим... more
    • by 
    •   12  
      SociologyPsychologyMathematicsPhysics
A dissertation submitted in partial fulfilment of the requirements for the degree of M.Sc. in Blockchain and Digial Ledger Technologies.
    • by 
    •   4  
      Aml and Fraud Detection in Bank TransactionsMalicious Node DetectionBlockchain TechnologiesDigital ledger technology
Digital certificates serve as essential cryptographic tools in securing online transactions and communications by verifying the identities of parties involved. The main goal of this project is to make digital certificates more secure... more
    • by 
    •   6  
      Image ProcessingMachine LearningData MiningDigital Signal Processing
Permissioned blockchains are arising as a solution to federate companies prompting accountable interactions. A variety of consensus algorithms for such blockchains have been proposed, each of which has dierent benets and drawbacks.... more
    • by 
    •   6  
      EngineeringComputer ScienceThe InternetByzantine Fault Tolerance
Miért is vonzaná két test egymást? Van e valami kiváltó erő a testekben, ami ezt kiváltaná. Az eltörölt éter elmélet ad rá okot, azaz a taszításra, ami messzebbről vonzásnak tűnhet. Ezt vizsgáljuk meg. Why would two bodies attract each... more
    • by 
    •   3  
      GravityEthereumOlbers' Paradox
There was a problem in Eastern Canada where the Teachers were not getting paid due to pension problems. I wrote this contract in response to that problem. There are Funds. Student's have Funds that can be funded by anyone with an... more
    • by 
    •   5  
      FinanceEducation FundingTeachersEthereum
Ethereum es el principal ecosistema basado en blockchain que proporciona un entorno para codificar y ejecutar contratos inteligentes, propiedad que en estos últimos años recibió gran atención por las nuevas aplicaciones comerciales y,... more
    • by 
    •   8  
      BusinessComputer ScienceVerificationSolidity
    • by 
In Sri Lanka, the widespread occurrence of fraudulent activities in vehicle registration processes presents notable challenges, especially regarding ownership disputes and discrepancies in vehicle history. This study first investigates... more
    • by 
    •   5  
      BlockchainBlockchain TechnologiesEthereumSmart Contract
Artificial intelligence (AI) is a very powerful technology and can be a potential disrupter and essential enabler. As AI expands into almost every aspect of our lives, people raise serious concerns about AI misbehaving and misuse. To... more
    • by 
Définition des NFT,
Les législations en vigueur en France et en zone européenne.
    • by 
    •   2  
      nfts cryptoNFT art
Приготовьтесь к очередному эпизоду "Кибербезопасности", в котором будут показаны наши любимые кибер-злодеи, и их громкие облачные выходки! На этот раз АНБ и ФБР объединились, чтобы рассказать захватывающую историю о том, что атакующим... more
    • by 
    •   6  
      Information TechnologyTechnologyInformation SecuritySecurity
Crowdfunding has revolutionized the way individuals and organizations raise funds for their endeavors. With the rise of online platforms and social media, this innovative method of fundraising allows entrepreneurs and non-profit... more
    • by 
    • Computer Science
    • by 
    •   9  
      Computer ScienceProcess managementCustomer ServiceCryptographic Hash Functions
    • by 
    •   4  
      HumanitiesArtMultihomingIPSec
Aim: This study aims to offer a comprehensive examination of the security vulnerabilities associated with blockchain technology, with the aim of identifying critical challenges and formulating strategic solutions to bolster system... more
    • by 
    •   8  
      Computer ScienceDistributed ComputingDecentralizationCryptocurrency
    • by 
    •   14  
      PrivacyInformation Security and PrivacyPrivacy (Law)Libertarianism
    • by 
    •   6  
      Computer ScienceComputer SecurityInternet of ThingsSupply Chain