Showing 1 - 19 results of 19 for search '"smart contract"', query time: 0.09s Refine Results
  1. 1

    Survey of Research on Smart Contract Vulnerability Detection by LI Leixiao, ZHENG Yue, GAO Haoyu, XIONG Xiao, NIU Tieming, DU Jinze, GAO Jing

    Published 2022-11-01
    Subjects: “…|blockchain|smart contract|vulnerability detection|security…”
    Get full text
    Article
  2. 2
  3. 3

    Survey of Ethereum Smart Contract Fuzzing Technology Research by HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei

    Published 2022-08-01
    Subjects: “…ethereum smart contract|fuzzing|input generation|input mutation|test oracle…”
    Get full text
    Article
  4. 4

    Research and Implementation of Parallel Method in Blockchain and Smart Contract by WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai

    Published 2022-09-01
    Subjects: “…blockchain technology|smart contract|parachain blockchain|sbft consensus protocol|task parallel smart contract model…”
    Get full text
    Article
  5. 5

    Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning by LIU Zerun, ZHENG Hong, QIU Junjie

    Published 2023-04-01
    Subjects: “…blockchain|smart contract|vulnerability detection|abstract syntax tree|deep learning…”
    Get full text
    Article
  6. 6

    Green Supply Chain Emission Reduction Strategies and Smart Contracts Under Blockchain Technology by WANG Xin, WANG Yasheng, ZHANG Shuhua, WANG Xinyu, XU Shuai

    Published 2024-01-01
    Subjects: “…green supply chain; blockchain; smart contract; supply chain coordination; game theory…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Semantic Sharing Mechanism of Heterogeneous Government Data Based on Blockchain by TIAN Ye

    Published 2020-01-01
    Subjects: “…blockchain|decentralization|smart contract|open government data|linked data…”
    Get full text
    Article
  10. 10

    Research on Blockchain in Cloud Manufacturing Resource Allocation by XU Yangyang, WANG Yan

    Published 2022-10-01
    Subjects: “…|blockchain|cloud manufacturing|smart contract (sc)|resource allocation|game…”
    Get full text
    Article
  11. 11

    Auction-based Edge Cloud Deadline-aware Task Offloading Strategy by PEI Cui, FAN Guisheng, YU Huiqun, YUE Yiming

    Published 2023-04-01
    Subjects: “…edge cloud|auction mechanism|deadline aware|task offloading|smart contract…”
    Get full text
    Article
  12. 12
  13. 13

    Power data storage and sharing method based on blockchain and data lake by ZENG Fei, YANG Xiong, SU Wei, XIAO Xiaolong, YI Wenfei

    Published 2022-05-01
    Subjects: “…blockchain;power internet of things;distributed storage;ring signature;smart contract;data lake…”
    Get full text
    Article
  14. 14

    Survey on Cross-Chain Protocols of Blockchain by MENG Bo, WANG Yibing, ZHAO Can, WANG Dejun, MA Binhao

    Published 2022-10-01
    “…Secondly, the cross-chain protocols are divided into cross-chain communi-cation agreements, cross-chain asset transaction agreements and cross-chain smart contract call agreements, and the latest research is analyzed. …”
    Get full text
    Article
  15. 15

    Blockchain-based Trusted Service-oriented Architecture by CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing

    Published 2023-01-01
    “…During a service trusted invocation,the service consumer first encrypts the parameters and sends them to the target service provider.Secondly,the service provider receives the encryption parameters and decrypts them.Then,the service provider completes the service execution and encrypts the output result.Finally,when the service provider sends the encryption result to the service consumer,it completes the trusted credential construction and uplink.Based on the above,when a service dispute occurs,it will trigger the adjudication of the smart contract.The execution of the contract relies on trusted vouchers to correctly handle service disputes.Experimental results show that,compared with the traditional invocation,the proposed method can correctly handle the service disputes between service providers and requesters on the premise of ensuring that the growth rate of trusted invocation time of most services is no more than 30%.…”
    Get full text
    Article
  16. 16

    Research on a distributed trading mechanism of electric energy on demand side for prosumers by QIAN Xiaorui, ZHAN Xiangpeng, SHEN Yimin, XIAO Kai, PAN Shuchen, YANG Jun

    Published 2022-09-01
    “…In the weak centralized trading mode, blockchain network and smart contract are used to replace the functions of the trading center, and the market clearing is completed iteratively based on Lagrange dual decomposition algorithm. …”
    Get full text
    Article
  17. 17

    Co-Construction and Sharing of Literature and Information Resources in Regional Colleges and Universities Based on Block Chain Incentive Mechanism by DU Yu, WANG Hongye, HU Zhixun

    Published 2022-04-01
    “…[Method/Process] On the basis of MVVM (Model-view-View Model) architecture, with incentive mechanism, consensus mechanism, distributed structure, smart contract and big data analysis as the bottom support, the regional literature and information resources co-construction and sharing mechanism based on blockchain is constructed. …”
    Get full text
    Article
  18. 18

    Research on Intangible Cultural Heritage Digital Resources Development Based on NFT by MOU Lijun, XU Xin

    Published 2022-06-01
    “…[Method/Process] According to online survey and literature research, this paper analyzes the deep problems of the intangible cultural heritage digital resources development, introduces the key technology of NFT, which including smart contracts and blockchain, discusses the feasibility in intangible cultural heritage digital resources development. …”
    Get full text
    Article
  19. 19

    Design and Analysis of a Blockchain Security Framework Model for Smart Libraries by YANG Xiaofei, KONG Yuefan, SUN Jipu

    Published 2023-04-01
    “…[Results/Conclusions] The smart library blockchain security framework model is data-driven, relying on the advantages of blockchain technology such as decentralization, distributed storage, trust mechanism, consensus mechanism, smart contracts, timestamps, record operation traces, data traceability, and asset authentication, to achieve terminal security detection response at the basic layer, data-driven at the data layer, risk correlation analysis at the service layer, and user privacy protection at the application layer The closed-loop management of the evaluation layer can effectively ensure the authenticity, integrity, and security of smart library data, build a safe and trustworthy environment for smart library services, and achieve secure management of smart libraries, secure transmission and traceable digital resources, improved user experience, and sustainable development. …”
    Get full text
    Article