Computers, Journal Year: 2024, Volume and Issue: 13(9), P. 223 - 223
Published: Sept. 6, 2024
With its decentralized, immutable, and consensus-based validation features, blockchain technology has grown from early financial applications to a variety of different sectors. This paper aims outline various the blockchain, systematically identify general challenges key threats regarding adoption. The are organized into even broader groups, allow clear overview identification interconnected issues. Potential solutions introduced discussion, addressing their possible ways mitigating these forward-looking effects in fostering adoption technology. also highlights some potential directions for future research that may overcome unlock further applications. More generally, article attempts describe transformational implications technology, through manner which it contribute advancement diversity industries.
Language: Английский
Citations
6Computers, Journal Year: 2025, Volume and Issue: 14(4), P. 141 - 141
Published: April 8, 2025
Blockchain technology, originally introduced through Bitcoin cryptocurrency in 2008, has rapidly expanded beyond its financial roots, offering innovative solutions for secure data management across various sectors, including education. Higher education institutions, faced with challenges managing academic records, verifying degrees, assessing skills, and safeguarding personal data, have increasingly looked to blockchain answers. Blockchain’s transparent, immutable, decentralized nature provides potential these longstanding problems. This systematic review assesses blockchain-based proposals certificates management, aiming highlight globally recognized best practices, explore the latest applications, identify key hindering widespread adoption of technology A thorough discussion based on findings introduces mitigate insights into possible future research directions that could help overcome obstacles.
Language: Английский
Citations
0Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 124, P. 110366 - 110366
Published: April 25, 2025
Language: Английский
Citations
0Future Internet, Journal Year: 2024, Volume and Issue: 16(5), P. 169 - 169
Published: May 14, 2024
In a global context characterized by pressing need to find solution the problem of digital copyright protection, buyer-seller watermarking protocols based on asymmetric fingerprinting and adopting “buyer-friendly” approach have proven effective in addressing such problem. They can ensure high levels usability security. However, they usually resort trusted third parties (TTPs) guarantee protection process, this is often perceived as relevant drawback since TTPs may cause conspiracy or collusion problems, besides fact that are generally considered some sort “big brother”. This paper presents protocol achieve right compromise between security without employing TTP. The built around previous experiences conducted field buyer-friendly approach. Its peculiarity consists exploiting smart contracts executed within blockchain implement preset immutable rules run automatically under specific conditions control from kind central authority. result simple, usable, secure able do TTPs.
Language: Английский
Citations
3Published: Jan. 1, 2024
Language: Английский
Citations
1Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(7), P. 317 - 333
Published: July 3, 2024
This study investigates the role of information governance in mitigating financial crime risks stablecoin transactions. Using a variety analytical techniques, including simple linear regression, sentiment analysis with NLP tools, logistic and machine learning models, research evaluates impact on innovation, user trust, crimes, effectiveness combined compliance measures. The findings indicate that strict regulations reduce innovation but enhance market stability trust. Robust correlates strongly increased adoption, while higher anonymity features stablecoins are linked to incidence crimes. Integrating KYC/AML transaction monitoring significantly improves detection prevention crimes compared standalone approaches. These insights provide valuable guidance for policymakers, regulatory authorities, institutions develop strategies balance enhanced security market.
Language: Английский
Citations
1Applied Sciences, Journal Year: 2024, Volume and Issue: 15(1), P. 243 - 243
Published: Dec. 30, 2024
Blockchain technology, known for its decentralization, traceability, immutability, and security, has attracted widespread attention in academia been extensively applied numerous fields. However, as the application of blockchain expands, demand data storage increased rapidly, leading to rising costs reduced resource utilization efficiency. In practical scenarios, it is challenging minimize redundancy systems. Therefore, effectively optimizing become a key research focus. This paper explores optimization from perspective management, analyzing current techniques such pruning technique, IPFS optimization, sharding, erasure coding, deduplication, compression. It also discusses challenges scalability provides directions prospects future research.
Language: Английский
Citations
1Lecture notes in computer science, Journal Year: 2024, Volume and Issue: unknown, P. 84 - 94
Published: Nov. 15, 2024
Language: Английский
Citations
0Lecture notes in computer science, Journal Year: 2024, Volume and Issue: unknown, P. 33 - 49
Published: Nov. 15, 2024
Language: Английский
Citations
0Published: Oct. 25, 2024
Language: Английский
Citations
0