Abstract: The feasibility of using blockchain technology as a method to improve cybersecurity through data security transactions and users' anonymity is discussed in this paper. It scans network ...
Abstract: As a part of blockchain's infrastructure, the construction of Merkle trees typically relies on secure hash functions, such as SHA256. However, traditional blockchain systems face dual ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results