-
Chapter and Conference Paper
A Survey on Privacy Protection of Cross-Chain
Blockchain technology has gained widespread attention due to its features of decentralization, tamper resistance, and traceability. Various decentralized applications have formed numerous “value silos” while m...
-
Chapter and Conference Paper
A Survey of Consensus Mechanism Based on Reputation Model
The reputation models may be used to evaluate the reputation of blockchain nodes, and the consensus mechanisms can use the reputation models to quantify the credibility or dependability of nodes. The consensus...
-
Chapter and Conference Paper
IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption
While IoT devices provide people with richer and more complete services, they also generate a large amount of device data. The potential value of these data has spawned IoT data transactions. In the blockchain...
-
Chapter and Conference Paper
A Survey of Blockchain-Based Crowd Sensing Incentive Mechanism
Crowd sensing (CS) is a data acquisition mode using the sensing ability of mobile devices. As a distributed ledger, blockchain (BC) is used for crowd sensing to resist security risks in the incentive process...
-
Chapter and Conference Paper
Survey: Research on Blockchain Consensus Mechanism in IoT Security
The Internet of Things (IoT) technology, as an important part of a new generation of information technology, is beginning to be applied in more and more fields. However, due to the lack of basic security techn...
-
Chapter and Conference Paper
A DAPP Business Data Storage Model Based on Blockchain and IPFS
Blockchain technology has been applied in various fields, providing strong support for the medical field, supply chain and other industries, followed by the emergence of DApp based on blockchain smart contract...
-
Chapter and Conference Paper
SC-VDM: A Lightweight Smart Contract Vulnerability Detection Model
The smart contract technology of blockchain is being applied in many industries, but its security issues have also caused huge economic losses, so it is very important to conduct security audits on them before...
-
Chapter and Conference Paper
The Vulnerabilities in Smart Contracts: A Survey
Blockchain has attracted widespread attention since its inception and one of the special technologies is smart contracts. Smart contracts are programs on blockchain that act as trusted intermediary between the...
-
Chapter and Conference Paper
Trust Evaluation Mechanism of Service Nodes Based on Blockchain
The blockchain is a modern digital ledger that not only records currency transactions, but also records anything of value. Once the transaction is verified and submitted to the blockchain, it is difficult to r...
-
Chapter and Conference Paper
Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
An algorithmic stablecoin is a type of cryptocurrency managed by algorithms (i.e., smart contracts) to dynamically minimize the volatility of its price relative to a specific form of asset, e.g., US dollar. As al...
-
Article
Open AccessInvestigation of the effects of a fan-shaped Mewis duct before a propeller on propulsion performance
To define the guidelines for the design of a Mewis duct for a small bulk cargo ship, a numerical study was carried out to investigate the effects of a fan-shaped Mewis duct on propeller performance of a 38,000...