Search
Now showing items 71-73 of 73
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
(
Elsevier B.V.
, 2019 , Article)
Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ...