


default search action
IET Blockchain, Volume 3
Volume 3, Number 1, March 2023
- Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman

:
A remote and cost-optimized voting system using blockchain and smart contract. 1-17 - Yang Liu

, Weidong Yang, Yanlin Wang:
An access control model for data security sharing cross-domain in consortium blockchain. 18-34 - Moein Choobineh, Ali Arabnya

, Behrouz Sohrabi
, Amin Khodaei, Aleksi Paaso:
Blockchain technology in energy systems: A state-of-the-art review. 35-59
Volume 3, Number 2, June 2023
- Can Zhao, Qin Liu, Zonghua Hu, Ze Yu, Dejun Wang

, Bo Meng:
K-Go: An executable formal semantics of Go language in K framework. 61-73 - Roopa Vuppula, Himansu Shekhar Pradhan:

Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks. 74-97 - Umair B. Chaudhry

, Aysha K. M. Hydros:
Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm. 98-115 - Wenpeng Song

, Xin Pei, Ming Li:
A decentralized crypto network with dynamic threshold change. 116-122
Volume 3, Number 3, September 2023
- Xinlei Liu

, Yang Liu, Xiangyang Li, Haohao Cao, Yaoqi Wang
:
FP-BFT: A fast pipeline Byzantine consensus algorithm. 123-135 - Ardeshir Shojaeinasab

, Amir Pasha Motamed
, Behnam Bahrak
:
Mixing detection on Bitcoin transactions using statistical patterns. 136-148 - Li Li

, Jiahao Wu, Wei Cui
:
A review of blockchain cross-chain technology. 149-158 - Pouyan Jahanbin, Ravi S. Sharma

, Stephen C. Wingreen
, Nir Kshetri
, Kim-Kwang Raymond Choo
:
Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases. 159-168
Volume 3, Number 4, December 2023
- Liangmin Wang, Victor S. Sheng, Boris Düdder

, Haiqin Wu
, Huijuan Zhu:
Security and privacy issues in blockchain and its applications. 169-171 - Jianfei Zhou

, Ting Chen:
WASMOD: Detecting vulnerabilities in Wasm smart contracts. 172-181 - Sergii Grybniak

, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin:
Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness. 182-193 - Haifeng Lv

, Yong Ding:
Phishing detection on Ethereum via transaction subgraphs embedding. 194-203 - Jinglin Li

, Yihang Zhang, Chun Yang:
BlockDetective: A GCN-based student-teacher framework for blockchain anomaly detection. 204-212 - Kexin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu

:
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer. 213-221 - Xiangli Xiao

, Xiaotong He, Yushu Zhang
, Xuewen Dong, Lu-Xing Yang
, Yong Xiang:
Blockchain-based reliable image copyright protection. 222-237 - Xia Feng, Kaiye Li, Songze Wu, Yan Xin:

Enhancing the blockchain interoperability through federated learning with directed acyclic graph. 238-248 - Yuwei Xu

, Ran He
, Shengjiang Dai
, Yujian Zhang
:
ChainKeeper: A cross-chain scheme for governing the chain by chain. 249-264 - Chuntang Yu

, Yongzhao Zhan, Pujie Jing, Xiangmei Song:
SPRA: Scalable policy-based regulatory architecture for blockchain transactions. 265-282

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














