Abstract is missing.
- On the Impact of Network Transport Protocols on Leader-Based Consensus CommunicationRichard von Seck, Filip Rezabek, Sebastian Gallenmüller, Georg Carle. 1-11 [doi]
- Blockchain-Powered Fraud Prevention in Health Insurance IndustryZain Buksh, A. B. M. Shawkat Ali, Amin Sakzad. 1-8 [doi]
- Anomaly Detection in Bitcoin Network: Using Distance-based and Tree-based Unsupervised Learning MethodsYossapol Witayanont, Waraporn Viyanon. 1-7 [doi]
- A Blockchain-Based Self-Sovereign Identity System for KYC ProcessesChengzu Dong, Aiting Yao, Zhiyu Xu, Meiqu Lu, Frank Jiang 0001, Shiping Chen 0001, Xiao Liu 0004. 1-11 [doi]
- A Flexible and Privacy-preserving Cross-chain Identity Authentication System based on Anonymous CredentialsLiehuang Zhu, Danlei Xiao, Haotian Deng, Zihao Wang, Cong Zuo, Licheng Wang, Chuan Zhang 0003. 1-7 [doi]
- Blockchain for Smart Logistics: Enhancing Identity Security, Bidding Transparency and Goods TrackingZoey Ziyi Li, Jun Zhao, Hui Cui 0001, Erica Xin Zheng, Xin Ma, Dennis Y. W. Liu, Man Ho Au. 1-9 [doi]
- A Game Theoretic Analysis of Validator Strategies in Ethereum 2.0Chien-Chih Chen, Wojciech Golab. 1-14 [doi]
- A Blockchain-Based Digital Identity Management System via Decentralized Anonymous CredentialsHui Cui 0001, Monica T. Whitty, Atsuko Miyaji, Zoey Ziyi Li. 1-11 [doi]
- FHE-Rollups: Scaling Confidential Smart Contracts on Ethereum and BeyondGuy Zyskind, Yonatan Erez, Tom Langer, Itzik Grossman, Lior Bondarevsky. 1-9 [doi]
- Statically Checking Transaction Ordering Dependency in Ethereum Smart ContractsSundas Munir, Walid Taha. 1-8 [doi]
- Smooth Transition from PoW to PoSXinyu Zhang 0017, Runchao Han, Tong Cao, Jiangshan Yu. 1-7 [doi]
- Cross-chain Abnormal Transaction Detection via Graph-based Multi-model FusionYong Lin, Peng Jiang 0007, Liehuang Zhu. 1-9 [doi]
- Achieving Privacy-Preserving Optimizer Architecture for Intent Execution on EVM BlockchainWeijie Wang, Haotian Deng, Jinwen Liang, Chuan Zhang 0003. 1-9 [doi]
- CLEAN: Cloud-enabled Scalable Blockchain Outsourcing System Using Dynamic ProgrammingWeilin Chan, Yihang Wei, Peng Jiang 0007, Lei Xu 0016, Liehuang Zhu, Jing Yu 0007. 1-13 [doi]
- Leading Hide Bribery Stubborn Mining AttackWeipeng Liang, Shan Jiang, Weijie Li, Yu Wang 0017. 1-6 [doi]