![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Key-Based Transaction Reordering: An Optimized Approach for Concurrency Control in Hyperledger Fabric
As blockchain technology garners increased adoption, permissioned blockchains like Hyperledger Fabric emerge as a popular blockchain system for develo** scalable decentralized applications. Nonetheless, para...
-
Article
Ensemble machine learning to evaluate the in vivo acute oral toxicity and in vitro human acetylcholinesterase inhibitory activity of organophosphates
Organophosphates (OPs) are hazardous chemicals widely used in industry and agriculture. Distribution of their residues in nature causes serious risks to humans, animals, and plants. To reduce hazards from OPs,...
-
Article
Teegraph: trusted execution environment and directed acyclic graph-based consensus algorithm for IoT blockchains
-
Chapter and Conference Paper
Asycome: A JointCloud Data Asynchronous Collaboration Mechanism Based on Blockchain
In the Internet of Everything (IoE), due to its issues of complexity and heterogeneity, message delay cannot be guaranteed, and it is not enough to leverage a centralized model for data collaboration. By leveragi...
-
Chapter and Conference Paper
Ladder: A Blockchain Model of Low-Overhead Storage
Emerging blockchain accounting mechanism allow mutually distributed parties to transport trusted information and ensure the correctness of data. Every blockchain node stores the complete block locally. Althoug...
-
Article
A survey of Blockchain consensus algorithms: mechanism, design and applications
In 2008, Blockchain was introduced to the world as the underlying technology of the Bitcoin system. After more than a decade of development, various Blockchain systems have been proposed by both academia and i...
-
Chapter and Conference Paper
BBCPS: A Blockchain Based Open Source Contribution Protection System
In the current open source ecosystem, developers rely on internal factors, such as ideology, interesting, and other external factors, such as reputation, learning, to participate in the contribution of open so...
-
Chapter and Conference Paper
Model the Influence of Sybil Nodes in P2P Botnets
Sybil attacks are suitable to mitigate P2P botnets, and the effects depend on the influences of Sybil nodes. However, the problem of how to evaluate the influences of Sybil nodes is rarely studied. Considering...