6G technology and taxonomy of attacks on blockchain technology
Blockchain technology is now being used in every aspect of human life. It appears like everyone is racing to develop apps that run on top of the blockchain technology available today. Indeed, this is owing to the fact that it has distinct qualities and a distinctive design. However, it is not well s...
Main Authors: | Firdous Kausar, Fahad M. Senan, Hafiz M. Asif, Kaamran Raahemifar |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2022-06-01
|
Series: | Alexandria Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016821006530 |
Similar Items
-
Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses
by: Nur Arifin Akbar, et al.
Published: (2021-11-01) -
Overview of blockchain assets theft attacks and defense technology
by: Beiyuan YU, et al.
Published: (2023-02-01) -
Overview of blockchain assets theft attacks and defense technology
by: Beiyuan YU, Shanyao REN, Jianwei LIU
Published: (2023-02-01) -
Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus
by: Mikolaj Karpinski, et al.
Published: (2021-09-01) -
Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks
by: Sarwar Sayeed, et al.
Published: (2020-09-01)