Blockchain Security: A Survey of Techniques and Research Directions
Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access sec...
Uloženo v:
| Vydáno v: | IEEE transactions on services computing Ročník 15; číslo 4; s. 2490 - 2510 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
01.07.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 1939-1374, 2372-0204 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access security, and 4) automated smart contracts for data programming and operations. However, the progress and promotion of Blockchain have been seriously impeded by various security issues in blockchain-based applications. Furthermore, previous research on blockchain security has been mostly technical, overlooking considerable business, organizational, and operational issues. To address this research gap from the perspective of information systems, we review blockchain security research in three levels, namely, the process level, the data level, and the infrastructure level, which we refer to as the PDI model of blockchain security. In this survey, we examine the state of blockchain security in the literature. Based on the insights obtained from this initial analysis, we then suggest future directions of research in blockchain security, shedding light on urgent business and industrial concerns in related computing disciplines. |
|---|---|
| AbstractList | Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access security, and 4) automated smart contracts for data programming and operations. However, the progress and promotion of Blockchain have been seriously impeded by various security issues in blockchain-based applications. Furthermore, previous research on blockchain security has been mostly technical, overlooking considerable business, organizational, and operational issues. To address this research gap from the perspective of information systems, we review blockchain security research in three levels, namely, the process level, the data level, and the infrastructure level, which we refer to as the PDI model of blockchain security. In this survey, we examine the state of blockchain security in the literature. Based on the insights obtained from this initial analysis, we then suggest future directions of research in blockchain security, shedding light on urgent business and industrial concerns in related computing disciplines. |
| Author | Bian, Yiyang Zhao, J. Leon Huang, Yongfeng Zhou, Man Leng, Jiewu |
| Author_xml | – sequence: 1 givenname: Jiewu orcidid: 0000-0003-4068-3910 surname: Leng fullname: Leng, Jiewu email: jwleng@gdut.edu.cn organization: State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment, Guangdong University of Technology, Guangzhou, Guangdong, China – sequence: 2 givenname: Man surname: Zhou fullname: Zhou, Man email: theoggw@163.com organization: State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment, Guangdong University of Technology, Guangzhou, Guangdong, China – sequence: 3 givenname: J. Leon surname: Zhao fullname: Zhao, J. Leon email: leonzhao@cuhk.edu.cn organization: School of Management and Economics, Chinese University of Hong Kong, Shenzhen, China – sequence: 4 givenname: Yongfeng orcidid: 0000-0002-5190-9535 surname: Huang fullname: Huang, Yongfeng email: cz_hyf@163.com organization: School of Computer Engineering, Jiangsu University of Technology, Changzhou, Jiangsu, China – sequence: 5 givenname: Yiyang orcidid: 0000-0002-1821-2699 surname: Bian fullname: Bian, Yiyang email: bianyiyang@nju.edu.cn organization: Department of Information Management and Information Systems, Nanjing University, Nanjing, Jiangsu, China |
| BookMark | eNp9kEtLAzEUhYNUsFb3gpuA66l5NQ93tT6hINjZhzS9oal1piYzQv-9M7S4cOHqwOWee879ztGgqitA6IqSMaXE3JaL2ZgRRsaccC0FPUFDxhUrupEYoCE13BSUK3GGznPeECKZ1maIZvfb2n_4tYsVXoBvU2z2d3iKF236hj2uAy7Br6v41ULGrlrhd8jgkl_jh5jAN7Gu8gU6DW6b4fKoI1Q-PZazl2L-9vw6m84LzwxtCqEAVlKIrpXzzhHnDSiqKJlQ6vxEBUmAdOqVWJKwdFKEpQSmWTCKBMlH6OZwdpfqvk5jN3Wbqi7RMmm0pnzCVbdFDls-1TknCHaX4qdLe0uJ7UnZjpTtSdkjqc4i_1h8bFz_WpNc3P5nvD4YIwD85himqJaa_wCYNna_ |
| CODEN | ITSCAD |
| CitedBy_id | crossref_primary_10_1016_j_ipm_2023_103412 crossref_primary_10_1109_COMST_2023_3315374 crossref_primary_10_1109_TII_2023_3325057 crossref_primary_10_1016_j_eswa_2025_127815 crossref_primary_10_1016_j_compind_2022_103789 crossref_primary_10_1016_j_aei_2025_103179 crossref_primary_10_1109_JIOT_2025_3554573 crossref_primary_10_1007_s12083_023_01613_7 crossref_primary_10_1016_j_jmsy_2022_09_017 crossref_primary_10_1155_2022_2069195 crossref_primary_10_1007_s10586_022_03668_2 crossref_primary_10_1109_TCSS_2021_3129259 crossref_primary_10_3390_fi15040121 crossref_primary_10_1016_j_jnca_2025_104171 crossref_primary_10_1007_s42979_024_03487_9 crossref_primary_10_1109_JIOT_2025_3572962 crossref_primary_10_1155_2022_8265140 crossref_primary_10_1155_2022_1834873 crossref_primary_10_1109_TII_2022_3215606 crossref_primary_10_1155_2022_2410455 crossref_primary_10_1155_2022_6144664 crossref_primary_10_1016_j_aei_2022_101791 crossref_primary_10_1109_TIFS_2025_3597223 crossref_primary_10_1109_ACCESS_2022_3205019 crossref_primary_10_1007_s10586_022_03696_y crossref_primary_10_1016_j_grets_2025_100169 crossref_primary_10_1007_s10586_022_03616_0 crossref_primary_10_3390_informatics12020043 crossref_primary_10_1016_j_iref_2023_07_053 crossref_primary_10_3390_app15074037 crossref_primary_10_1038_s41598_022_12412_0 crossref_primary_10_1109_TCE_2024_3371501 crossref_primary_10_1007_s42452_021_04909_6 crossref_primary_10_1016_j_iot_2025_101684 crossref_primary_10_3390_math12060830 crossref_primary_10_1109_JSEN_2023_3322535 crossref_primary_10_1002_qute_202300096 crossref_primary_10_1038_s41598_024_83399_z crossref_primary_10_1109_ACCESS_2024_3431279 crossref_primary_10_3390_sym15040924 crossref_primary_10_1016_j_engappai_2023_107606 crossref_primary_10_3390_electronics12173592 crossref_primary_10_1016_j_cosrev_2024_100696 crossref_primary_10_32604_cmc_2024_053077 crossref_primary_10_1109_LSENS_2024_3482177 crossref_primary_10_1016_j_future_2024_107655 crossref_primary_10_1109_TSC_2025_3577505 crossref_primary_10_3390_s24124022 crossref_primary_10_1007_s10586_024_04737_4 crossref_primary_10_1016_j_comnet_2025_111123 crossref_primary_10_3390_foods13223607 crossref_primary_10_1080_00207543_2022_2089929 crossref_primary_10_3390_app14010139 crossref_primary_10_1016_j_eswa_2021_115101 crossref_primary_10_1145_3705296 crossref_primary_10_3390_pr13082622 crossref_primary_10_1016_j_jmsy_2023_08_023 crossref_primary_10_1109_TII_2023_3282319 crossref_primary_10_1016_j_procs_2025_04_337 crossref_primary_10_3390_jtaer18010008 crossref_primary_10_3390_s22218400 crossref_primary_10_3390_cryptography8020012 crossref_primary_10_1016_j_bcra_2024_100257 crossref_primary_10_1016_j_jii_2023_100456 crossref_primary_10_1038_s41598_022_19138_z crossref_primary_10_1109_ACCESS_2022_3188123 crossref_primary_10_1038_s41598_024_78995_y crossref_primary_10_1109_TMC_2024_3357499 crossref_primary_10_3390_buildings14061600 crossref_primary_10_1016_j_future_2025_107731 crossref_primary_10_1007_s10664_025_10623_3 crossref_primary_10_1007_s12652_024_04801_2 crossref_primary_10_1155_2022_1987933 crossref_primary_10_1109_JIOT_2025_3583408 crossref_primary_10_1109_TMC_2024_3475481 crossref_primary_10_1109_TSMC_2023_3257172 crossref_primary_10_1049_blc2_12077 crossref_primary_10_4018_IJBASC_369334 crossref_primary_10_1007_s11227_024_06715_4 crossref_primary_10_1109_TSC_2025_3544130 crossref_primary_10_3390_app12189184 crossref_primary_10_1109_TNSE_2023_3344158 crossref_primary_10_1109_TCE_2024_3426101 crossref_primary_10_1109_JIOT_2024_3426536 crossref_primary_10_1109_TCSS_2024_3516144 crossref_primary_10_3390_electronics13163116 crossref_primary_10_1007_s11227_021_03841_1 crossref_primary_10_1016_j_jnca_2023_103795 crossref_primary_10_1016_j_future_2024_05_003 crossref_primary_10_1007_s11227_025_07718_5 crossref_primary_10_1016_j_comnet_2025_111274 crossref_primary_10_1016_j_comnet_2025_111438 crossref_primary_10_1109_TCSS_2024_3395467 crossref_primary_10_1108_K_05_2021_0384 crossref_primary_10_1371_journal_pone_0302145 crossref_primary_10_1109_TSC_2024_3440012 crossref_primary_10_1145_3721140 crossref_primary_10_1038_s40494_025_01818_4 crossref_primary_10_1016_j_suscom_2025_101101 crossref_primary_10_1109_TCYB_2024_3403923 crossref_primary_10_1145_3768318 crossref_primary_10_1007_s11277_024_11694_z crossref_primary_10_1109_TMC_2025_3565898 crossref_primary_10_1002_cpe_70120 crossref_primary_10_1155_2022_5842371 crossref_primary_10_1109_OJCOMS_2024_3356076 crossref_primary_10_3390_app122110794 crossref_primary_10_1016_j_future_2023_08_021 crossref_primary_10_1109_JAS_2023_123642 crossref_primary_10_3390_machines10100858 |
| Cites_doi | 10.1109/IC2E.2018.00069 10.1007/978-3-540-74143-5_30 10.1109/ACCESS.2017.2730843 10.1109/ACCESS.2017.2782733 10.1109/TII.2012.2198666 10.1016/j.future.2018.07.042 10.1016/j.knosys.2017.07.023 10.1109/COMST.2015.2388550 10.1007/s00453-016-0221-0 10.1119/1.1891170 10.1007/978-3-642-32009-5_12 10.2139/ssrn.2646618 10.7249/rr2223 10.1007/978-3-319-70972-7_20 10.1145/2976749.2978362 10.1109/ACCESS.2018.2799854 10.1109/TDSC.2016.2616861 10.1016/j.dcan.2019.01.005 10.1109/ICRITO.2017.8342399 10.1007/978-3-662-48000-7_29 10.1145/3098954.3098958 10.1109/ICOIN.2018.8343266 10.1109/MSP.2006.167 10.1016/j.knosys.2016.03.008 10.1016/j.elerap.2018.03.005 10.1109/ACCESS.2018.2847632 10.3390/s18082575 10.1109/CCGRID.2017.8 10.1016/j.clsr.2017.05.007 10.1145/3012704 10.1007/s10257-018-0377-z 10.1145/2976749.2978309 10.1186/s40854-016-0049-2 10.1016/j.future.2017.08.020 10.1109/EuroSPW.2017.48 10.1109/ICCNC.2018.8390265 10.1109/MITP.2017.3051335 10.1007/0-387-34805-0_46 10.3934/mfc.2018007 10.1016/j.clsr.2009.11.008 10.1002/spy2.97 10.1109/COMST.2017.2771153 10.1145/2994581 10.1109/ACCESS.2018.2809426 10.1109/ARES.2008.33 10.1007/978-3-319-70278-0_31 10.1109/NOMS.2018.8406309 10.1145/3243734.3243853 10.1007/978-3-662-58387-6_28 10.1080/17517575.2018.1470259 10.1007/bf00196725 10.1016/j.jmsy.2020.04.012 10.1109/SP.2018.00018 10.1016/j.future.2018.09.019 10.1109/TKDE.2017.2781227 10.1145/2896386 10.1109/NCA.2017.8171384 10.1016/0378-7206(91)90024-v 10.1109/DSN.2019.00063 10.1007/978-3-319-94478-4_9 10.1080/0951192x.2019.1667032 10.1016/j.adhoc.2018.11.010 10.1145/3186727 10.1049/iet-ifs.2011.0094 10.1007/s11036-017-0872-3 10.1109/ACCESS.2018.2801266 10.1109/SP.2017.29 10.1109/SERVICES.2017.23 10.1109/ICCE.2016.7430693 10.1109/NAPS.2017.8107313 10.1109/ICACCS.2017.8014672 10.1109/SP.2016.55 10.23919/MIPRO.2018.8400278 10.1155/2017/4746586 10.1007/978-981-10-7605-3_50 10.1109/MSP.2018.3111245 10.1145/2660267.2660379 10.1016/j.ins.2018.06.071 10.1109/ACCESS.2017.2788411 10.1109/ACCESS.2018.2812176 10.1109/SFCS.1982.38 10.1155/2018/5978636 10.1109/COMST.2018.2863956 10.1080/00207543.2018.1471243 10.1109/SPW.2015.27 10.1145/2976749.2978303 10.7717/peerj-cs.114 10.1177/1063293X16666312 10.6633/IJNS.201709.19(5).01 10.1007/s10845-017-1301-y 10.1145/571637.571640 10.14569/IJACSA.2017.080757 10.1016/j.rcim.2019.101895 10.1016/j.procs.2018.01.019 10.1007/s10257-017-0362-y 10.1109/INFOCOM.2018.8486401 10.1109/IWBOSE.2018.8327565 10.1109/TSMC.2019.2930418 10.3390/app9091788 10.1088/2058-9565/aabc6b 10.1145/2695533.2695545 10.1108/JFRC-08-2016-0068 10.1145/3007788.3007790 10.1145/1216218.1216224 10.1109/SOSE.2017.32 10.1016/S1361-3723(05)70275-X 10.1007/978-3-319-48965-0_9 10.1186/s40854-016-0039-4 10.1016/j.jclepro.2019.06.265 10.1109/ANTS.2017.8384164 10.1109/IJCNN.2018.8489377 10.1109/MCC.2018.011791712 10.1007/s00145-007-9006-6 10.1109/MCOM.2017.1700879 10.1007/978-3-642-14623-7_25 10.1007/978-3-319-93638-3_32 10.1145/3302505.3310086 10.1109/ICCCN.2018.8487349 10.1109/SP.2014.36 10.1109/CVCBT.2018.00014 10.1007/3-540-46766-1_9 10.1109/CompComm.2016.7924656 10.4236/jsea.2016.910036 10.1109/COMST.2015.2494502 10.1016/j.rser.2020.110112 10.1108/09685229910292817 10.1109/MCC.2017.3791019 10.1155/2018/9641273 10.1109/JIOT.2017.2740569 10.1108/scm-03-2018-0143 10.1109/ICSAI.2017.8248427 10.1109/HiPCW.2018.8634280 10.1007/3-540-45496-9_20 10.2308/isys-51804 10.1145/2976749.2978341 10.1145/2976749.2978326 10.1007/978-3-662-53357-4_6 10.1504/ijwgs.2018.10016848 10.1109/MNET.2018.1700344 10.3390/sym9080164 10.1016/0167-4048(93)90110-Q 10.1007/s11227-016-1870-0 10.1145/359340.359342 10.1007/11426639_27 10.1007/978-3-540-27800-9_28 10.1016/j.ins.2018.06.018 10.1007/s12083-016-0456-1 10.1016/S0167-4048(03)00413-9 10.1109/EuroSP.2017.37 10.1109/ACCESS.2017.2757955 10.2139/ssrn.2853428 10.1145/792704.792706 10.1109/EUROCON.2017.8011213 10.1117/12.2266994 10.1016/j.jclepro.2020.124405 10.1016/j.ins.2018.10.024 10.1007/978-3-662-54455-6_8 10.1109/TITS.2017.2777990 10.1109/TITS.2004.837824 10.1007/978-3-030-03329-3_15 10.1145/3124441 10.1007/978-3-662-53357-4_4 10.1007/978-3-319-89722-6_10 10.1109/SP.2013.34 10.1007/978-3-319-67816-0_17 10.1145/3243734.3243780 10.1145/2517872.2517878 10.1016/j.compeleceng.2018.10.015 10.1145/3167086 10.1007/BF02351717 10.1109/MIS.2010.79 10.1109/INFOCOM.2018.8485890 10.1109/TII.2017.2738842 10.4018/978-1-59140-557-3.ch189 10.1007/978-3-319-59665-5_15 10.1007/978-3-319-66399-9_25 10.1145/3005745.3005771 10.1145/1315245.1315317 10.1109/TSC.2018.2876846 10.3390/technologies7010028 10.1109/ACCESS.2018.2844400 10.1109/HPCC-SmartCity-DSS.2016.0198 10.1007/3-540-45760-7_17 10.1109/ISEASP.2017.7976994 10.5220/0006270005590566 10.1016/j.tele.2018.11.006 10.1007/978-3-662-58820-8_18 10.1007/978-1-4614-4139-7_10 10.1145/2993600.2993611 10.1186/s40854-016-0034-9 10.14722/ndss.2014.23298 10.1016/j.procs.2018.03.063 10.1145/3212998 10.1007/s12652-018-0881-5 10.1145/3133956.3134010 10.1016/0142-0615(83)90023-6 10.1007/978-3-319-46568-5_53 10.1002/sec.1748 10.1109/SMARTCOMP.2018.00074 10.1007/978-3-319-69084-1_19 10.1109/TSMC.2018.2854904 10.1109/CCGRID.2017.111 10.2139/ssrn.2849251 10.1111/j.1365-2575.2006.00219.x 10.1007/978-3-319-63688-7_12 10.1109/COMPSAC.2016.142 10.1186/s40854-016-0031-z |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TSC.2020.3038641 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Business |
| EISSN | 2372-0204 |
| EndPage | 2510 |
| ExternalDocumentID | 10_1109_TSC_2020_3038641 9271868 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Shenzhen Special Fund for the Development of Strategic Emerging Industries grantid: JCYJ20170818100156260 – fundername: National Natural Science Foundation of China grantid: 52075107; 71932002 funderid: 10.13039/501100001809 – fundername: National Key Research and Development Program of China grantid: 2018AAA0101700 – fundername: S&T Planning Project of Guangdong Province grantid: 2019A050503010 – fundername: S&T Planning Project of Sichuan Province grantid: 2019-YF05-02050-GX; 2020YFSY0061 |
| GroupedDBID | 0R~ 29I 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF M43 O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c291t-47eed644372acaa0ac9e71710511ac57f60e0c57c74b0fba64fb6e282f970f63 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 198 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000836642800054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-1374 |
| IngestDate | Sun Nov 09 08:11:25 EST 2025 Tue Nov 18 22:27:48 EST 2025 Sat Nov 29 02:04:35 EST 2025 Wed Aug 27 02:23:34 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-47eed644372acaa0ac9e71710511ac57f60e0c57c74b0fba64fb6e282f970f63 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5190-9535 0000-0003-4068-3910 0000-0002-1821-2699 |
| PQID | 2698813537 |
| PQPubID | 85503 |
| PageCount | 21 |
| ParticipantIDs | proquest_journals_2698813537 crossref_primary_10_1109_TSC_2020_3038641 crossref_citationtrail_10_1109_TSC_2020_3038641 ieee_primary_9271868 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-07-01 |
| PublicationDateYYYYMMDD | 2022-07-01 |
| PublicationDate_xml | – month: 07 year: 2022 text: 2022-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on services computing |
| PublicationTitleAbbrev | TSC |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref56 ref208 ref59 ref205 ref58 ref53 ref52 ref204 ref55 ref201 ref54 (ref26) 2018 ref51 ref50 ref46 ref218 ref45 ref48 ref216 ref47 ref217 ref42 ref41 ref215 ref44 ref212 ref43 ref213 ref49 ref8 Li (ref140) 2017 ref7 ref9 ref4 ref3 ref6 ref100 ref221 ref222 ref40 Noether (ref165) 2015 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 Darwin (ref21) 2010 ref39 ref38 Gentry (ref102) 2009 ref20 Nakamoto (ref1) 2008 ref28 ref27 ref29 Fan (ref202) Stathakopoulous (ref153) 2017 ref200 Hisayoshi (ref146) 2013 Mayer (ref214) 2016 ref128 ref249 ref129 ref97 ref126 ref247 ref96 ref248 ref99 ref245 ref98 ref246 Chappelle (ref22) 2013 Noyes (ref220) 2016 ref93 ref133 ref254 Crosby (ref5) 2016; 6 ref92 ref255 ref95 ref131 ref252 ref94 ref132 ref253 ref250 ref91 ref90 ref89 ref139 Lamport (ref206) 2001; 32 Schwartz (ref196) 2014 ref86 ref137 ref258 ref85 ref138 ref259 ref88 ref135 ref256 ref87 ref136 ref257 Mercer (ref163) 2016 Hardjono (ref178) 2019 ref82 ref144 ref81 ref145 ref142 ref83 ref143 ref141 ref80 ref79 ref108 ref229 ref78 ref109 ref106 ref107 ref228 ref75 ref104 ref225 ref74 ref105 ref226 ref77 ref223 ref76 ref103 ref224 Brandenburger (ref125) 2018 Teutsch (ref120) 2019 ref71 ref111 ref232 ref70 ref112 ref73 ref230 ref72 ref110 ref231 ref68 ref119 ref67 ref117 ref238 ref118 ref239 ref64 ref236 ref63 ref237 ref66 ref234 ref65 ref114 Kwon (ref210) 2014 Wu (ref182) Meltzer (ref25) 2017 Yang (ref251) 2018 ref60 ref122 ref243 ref123 ref244 ref62 ref241 ref61 ref121 ref242 Cachin (ref211) 2017 ref240 Kerber (ref124) 2012 ref168 Du (ref199) ref177 Lacity (ref69) 2018; 17 ref175 ref174 ref171 ref172 ref179 ref180 ref181 ref188 ref189 Mazières (ref209) 2015 ref186 ref187 ref184 ref185 ref183 Dai (ref84) 2017; 87 ref148 ref149 ref147 Duffield (ref161) 2015 van Saberhagen (ref169) 2013 ref155 ref156 ref154 ref151 Lazarovich (ref134) 2015 ref150 Tudor (ref18) 2000 Ramachandran (ref130) 2017 ref159 ref157 ref158 Narula (ref176) Atallah (ref113) 2011 ref166 ref167 ref164 Zyskind (ref115) 2015 ref162 ref160 ref13 Ben-Sasson (ref173) 2018; 46 ref12 Heilman (ref219) ref15 ref14 ref11 ref10 ref17 ref16 ref19 Gaetani (ref235) Goldfeder (ref152) 2015 (ref116) 2018 (ref101) 2017 ref2 Liu (ref203) Howard (ref207) 2014 (ref24) 2017 ref191 ref192 Fleder (ref233) 2015 ref190 ref197 ref195 ref193 ref194 (ref23) 2013 Fiore (ref127) Wahab (ref227) 2018 (ref198) 2017 Axon (ref170) 2016 |
| References_xml | – volume-title: CIS year: 2017 ident: ref24 article-title: CIS critical security controls – ident: ref111 doi: 10.1109/IC2E.2018.00069 – ident: ref139 doi: 10.1007/978-3-540-74143-5_30 – year: 2017 ident: ref140 article-title: A searchable symmetric encryption scheme using blockchain – ident: ref135 doi: 10.1109/ACCESS.2017.2730843 – ident: ref94 doi: 10.1109/ACCESS.2017.2782733 – year: 2014 ident: ref210 article-title: Tendermint: Consensus without mining – ident: ref45 doi: 10.1109/TII.2012.2198666 – ident: ref87 doi: 10.1016/j.future.2018.07.042 – ident: ref256 doi: 10.1016/j.knosys.2017.07.023 – ident: ref50 doi: 10.1109/COMST.2015.2388550 – year: 2015 ident: ref233 article-title: Bitcoin transaction graph analysis – year: 2017 ident: ref211 article-title: Blockchain consensus protocols in the wild – ident: ref181 doi: 10.1007/s00453-016-0221-0 – ident: ref243 doi: 10.1119/1.1891170 – ident: ref98 doi: 10.1007/978-3-642-32009-5_12 – ident: ref71 doi: 10.2139/ssrn.2646618 – ident: ref79 doi: 10.7249/rr2223 – start-page: 2567 volume-title: Proc. IEEE Int. Conf. Syst., Man, Cybern. ident: ref199 article-title: A review on consensus algorithm of blockchain – year: 2018 ident: ref227 article-title: Privacy in blockchain systems – ident: ref34 doi: 10.1007/978-3-319-70972-7_20 – ident: ref32 doi: 10.1145/2976749.2978362 – ident: ref83 doi: 10.1109/ACCESS.2018.2799854 – ident: ref151 doi: 10.1109/TDSC.2016.2616861 – ident: ref239 doi: 10.1016/j.dcan.2019.01.005 – ident: ref14 doi: 10.1109/ICRITO.2017.8342399 – year: 2015 ident: ref209 article-title: The stellar consensus protocol: A federated model for internet-level consensus – year: 2010 ident: ref21 article-title: Security reference architecture – ident: ref195 doi: 10.1007/978-3-662-48000-7_29 – ident: ref72 doi: 10.1145/3098954.3098958 – ident: ref184 doi: 10.1109/ICOIN.2018.8343266 – ident: ref28 doi: 10.1109/MSP.2006.167 – ident: ref237 doi: 10.1016/j.knosys.2016.03.008 – ident: ref52 doi: 10.1016/j.elerap.2018.03.005 – ident: ref104 doi: 10.1109/ACCESS.2018.2847632 – ident: ref49 doi: 10.3390/s18082575 – year: 2017 ident: ref198 article-title: The coco framework technical overview – ident: ref131 doi: 10.1109/CCGRID.2017.8 – ident: ref36 doi: 10.1016/j.clsr.2017.05.007 – start-page: 129 volume-title: Proc. 24th USENIX Secur. Symp. ident: ref219 article-title: Eclipse attacks on bitcoins peer-to-peer network – ident: ref230 doi: 10.1145/3012704 – ident: ref7 doi: 10.1007/s10257-018-0377-z – ident: ref41 doi: 10.1145/2976749.2978309 – ident: ref4 doi: 10.1186/s40854-016-0049-2 – ident: ref13 doi: 10.1016/j.future.2017.08.020 – year: 2017 ident: ref101 article-title: Building safe A.I.: A tutorial for encrypted deep learning – ident: ref162 doi: 10.1109/EuroSPW.2017.48 – ident: ref217 doi: 10.1109/ICCNC.2018.8390265 – ident: ref48 doi: 10.1109/MITP.2017.3051335 – ident: ref193 doi: 10.1007/0-387-34805-0_46 – ident: ref10 doi: 10.3934/mfc.2018007 – ident: ref47 doi: 10.1016/j.clsr.2009.11.008 – ident: ref99 doi: 10.1002/spy2.97 – ident: ref259 doi: 10.1109/COMST.2017.2771153 – ident: ref2 doi: 10.1145/2994581 – ident: ref109 doi: 10.1109/ACCESS.2018.2809426 – ident: ref17 doi: 10.1109/ARES.2008.33 – ident: ref29 doi: 10.1007/978-3-319-70278-0_31 – ident: ref221 doi: 10.1109/NOMS.2018.8406309 – ident: ref250 doi: 10.1145/3243734.3243853 – year: 2009 ident: ref102 article-title: A fully homomorphic encryption scheme – ident: ref33 doi: 10.1007/978-3-662-58387-6_28 – ident: ref62 doi: 10.1080/17517575.2018.1470259 – year: 2015 ident: ref161 article-title: Dash: A privacycentric cryptocurrency – ident: ref180 doi: 10.1007/bf00196725 – year: 2019 ident: ref178 article-title: Verifiable anonymous identities and access control in permissioned blockchains – ident: ref64 doi: 10.1016/j.jmsy.2020.04.012 – ident: ref123 doi: 10.1109/SP.2018.00018 – ident: ref77 doi: 10.1016/j.future.2018.09.019 – ident: ref76 doi: 10.1109/TKDE.2017.2781227 – ident: ref112 doi: 10.1145/2896386 – ident: ref133 doi: 10.1109/NCA.2017.8171384 – ident: ref225 doi: 10.1016/0378-7206(91)90024-v – ident: ref248 doi: 10.1109/DSN.2019.00063 – ident: ref95 doi: 10.1007/978-3-319-94478-4_9 – ident: ref59 doi: 10.1080/0951192x.2019.1667032 – year: 2012 ident: ref124 article-title: Verifiable computation on ethereum – start-page: 485 volume-title: Proc. 12th USENIX Symp. Operating Syst. Des. Implementation ident: ref203 article-title: XFT: Practical fault tolerance beyond crashes – ident: ref258 doi: 10.1016/j.adhoc.2018.11.010 – ident: ref231 doi: 10.1145/3186727 – ident: ref155 doi: 10.1049/iet-ifs.2011.0094 – ident: ref121 doi: 10.1007/s11036-017-0872-3 – ident: ref157 doi: 10.1109/ACCESS.2018.2801266 – ident: ref218 doi: 10.1109/SP.2017.29 – ident: ref137 doi: 10.1109/SERVICES.2017.23 – ident: ref197 doi: 10.1109/ICCE.2016.7430693 – ident: ref56 doi: 10.1109/NAPS.2017.8107313 – ident: ref204 doi: 10.1109/ICACCS.2017.8014672 – ident: ref179 doi: 10.1109/SP.2016.55 – ident: ref183 doi: 10.23919/MIPRO.2018.8400278 – ident: ref150 doi: 10.1155/2017/4746586 – ident: ref105 doi: 10.1007/978-981-10-7605-3_50 – ident: ref212 doi: 10.1109/MSP.2018.3111245 – ident: ref215 doi: 10.1145/2660267.2660379 – ident: ref253 doi: 10.1016/j.ins.2018.06.071 – year: 2019 ident: ref120 article-title: A scalable verification solution for blockchains – ident: ref244 doi: 10.1109/ACCESS.2017.2788411 – ident: ref57 doi: 10.1109/ACCESS.2018.2812176 – ident: ref114 doi: 10.1109/SFCS.1982.38 – ident: ref53 doi: 10.1155/2018/5978636 – volume: 87 year: 2017 ident: ref84 article-title: Blockchain: An emerging solution for fraud prevention publication-title: CPA J. – ident: ref51 doi: 10.1109/COMST.2018.2863956 – ident: ref65 doi: 10.1080/00207543.2018.1471243 – year: 2017 ident: ref130 article-title: Using blockchain and smart contracts for secure data provenance management – ident: ref90 doi: 10.1109/SPW.2015.27 – ident: ref142 doi: 10.1145/2976749.2978303 – ident: ref246 doi: 10.7717/peerj-cs.114 – ident: ref255 doi: 10.1177/1063293X16666312 – year: 2017 ident: ref25 article-title: Security reference architecture: A practical guide to implementing foundational controls – ident: ref12 doi: 10.6633/IJNS.201709.19(5).01 – ident: ref63 doi: 10.1007/s10845-017-1301-y – ident: ref201 doi: 10.1145/571637.571640 – ident: ref93 doi: 10.14569/IJACSA.2017.080757 – ident: ref61 doi: 10.1016/j.rcim.2019.101895 – ident: ref6 doi: 10.1016/j.procs.2018.01.019 – volume-title: Information Security Architecture year: 2000 ident: ref18 – year: 2015 ident: ref115 article-title: Enigma: Decentralized computation platform with guaranteed privacy – ident: ref241 doi: 10.1007/s10257-017-0362-y – ident: ref234 doi: 10.1109/INFOCOM.2018.8486401 – volume: 46 start-page: 1 year: 2018 ident: ref173 article-title: Scalable, transparent, and post-quantum secure computational integrity publication-title: IACR Cryptol. ePrint Archive – year: 2015 ident: ref152 article-title: Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme – ident: ref35 doi: 10.1109/IWBOSE.2018.8327565 – ident: ref67 doi: 10.1109/TSMC.2019.2930418 – ident: ref186 doi: 10.3390/app9091788 – ident: ref245 doi: 10.1088/2058-9565/aabc6b – ident: ref190 doi: 10.1145/2695533.2695545 – ident: ref73 doi: 10.1108/JFRC-08-2016-0068 – year: 2018 ident: ref125 article-title: Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric – ident: ref191 doi: 10.1145/3007788.3007790 – year: 2014 ident: ref196 article-title: The ripple protocol consensus algorithm – year: 2008 ident: ref1 article-title: Bitcoin: A peer-to-peer electronic cash system – start-page: 863 volume-title: Proc. ACM SIGSAC Conf. Comput. Commun. Secur. ident: ref127 article-title: Verifiable delegation of computation on outsourced data – ident: ref9 doi: 10.1145/1216218.1216224 – start-page: 322 volume-title: Proc. Int. Conf. Inf. Comput. Appl. year: 2011 ident: ref113 article-title: Research on secure multi-party computational geometry – ident: ref128 doi: 10.1109/SOSE.2017.32 – ident: ref20 doi: 10.1016/S1361-3723(05)70275-X – ident: ref147 doi: 10.1007/978-3-319-48965-0_9 – ident: ref85 doi: 10.1186/s40854-016-0039-4 – year: 2013 ident: ref23 article-title: ISO/IEC 27000 family - Information security management systems – ident: ref58 doi: 10.1016/j.jclepro.2019.06.265 – ident: ref97 doi: 10.1109/ANTS.2017.8384164 – ident: ref136 doi: 10.1109/IJCNN.2018.8489377 – volume: 6 start-page: 1 year: 2016 ident: ref5 article-title: BlockChain technology: Beyond bitcoin publication-title: Appl. Innov. Rev. – year: 2015 ident: ref134 article-title: Invisible ink: Blockchain for data privacy publication-title: Doctoral dissertation, Massachusetts Institute of Technology – ident: ref257 doi: 10.1109/MCC.2018.011791712 – ident: ref138 doi: 10.1007/s00145-007-9006-6 – ident: ref55 doi: 10.1109/MCOM.2017.1700879 – ident: ref107 doi: 10.1007/978-3-642-14623-7_25 – ident: ref167 doi: 10.1007/978-3-319-93638-3_32 – volume: 32 start-page: 18 year: 2001 ident: ref206 article-title: Paxos made simple publication-title: ACM Sigact News – ident: ref249 doi: 10.1145/3302505.3310086 – ident: ref156 doi: 10.1109/ICCCN.2018.8487349 – year: 2018 ident: ref251 article-title: LinBFT: Linear-communication byzantine fault tolerance for public blockchains – ident: ref175 doi: 10.1109/SP.2014.36 – ident: ref229 doi: 10.1109/CVCBT.2018.00014 – ident: ref172 doi: 10.1007/3-540-46766-1_9 – ident: ref126 doi: 10.1109/CompComm.2016.7924656 – ident: ref46 doi: 10.4236/jsea.2016.910036 – ident: ref238 doi: 10.1109/COMST.2015.2494502 – ident: ref60 doi: 10.1016/j.rser.2020.110112 – start-page: 675 volume-title: Proc. 27th USENIX Secur. Symp. ident: ref182 article-title: DIZK: A distributed zero knowledge proof system – start-page: 245 volume-title: Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng. ident: ref202 article-title: Scalable practical byzantine fault tolerance with short-lived signature schemes – ident: ref8 doi: 10.1108/09685229910292817 – ident: ref70 doi: 10.1109/MCC.2017.3791019 – ident: ref110 doi: 10.1155/2018/9641273 – year: 2016 ident: ref220 article-title: Fast anti-malware by distributed blockchain consensus and feedforward scanning – ident: ref213 doi: 10.1109/JIOT.2017.2740569 – ident: ref42 doi: 10.1108/scm-03-2018-0143 – year: 2018 ident: ref116 article-title: PlatON: A high-efficiency trustless computing network – ident: ref30 doi: 10.1109/ICSAI.2017.8248427 – ident: ref100 doi: 10.1109/HiPCW.2018.8634280 – year: 2013 ident: ref169 article-title: CryptoNote v 2.0 – ident: ref208 doi: 10.1007/3-540-45496-9_20 – ident: ref82 doi: 10.2308/isys-51804 – ident: ref185 doi: 10.1145/2976749.2978341 – ident: ref226 doi: 10.1145/2976749.2978326 – ident: ref37 doi: 10.1007/978-3-662-53357-4_6 – ident: ref43 doi: 10.1504/ijwgs.2018.10016848 – ident: ref68 doi: 10.1109/MNET.2018.1700344 – start-page: 1 volume-title: Proc. Italian Conf. Cybersecurity ident: ref235 article-title: Blockchain-based database to ensure data integrity in cloud computing environments – ident: ref15 doi: 10.3390/sym9080164 – ident: ref223 doi: 10.1016/0167-4048(93)90110-Q – ident: ref222 doi: 10.1007/s11227-016-1870-0 – ident: ref103 doi: 10.1145/359340.359342 – ident: ref154 doi: 10.1007/11426639_27 – ident: ref164 doi: 10.1007/978-3-540-27800-9_28 – ident: ref252 doi: 10.1016/j.ins.2018.06.018 – year: 2014 ident: ref207 article-title: ARC: Analysis of raft consensus – ident: ref44 doi: 10.1007/s12083-016-0456-1 – ident: ref27 doi: 10.1016/S0167-4048(03)00413-9 – ident: ref78 doi: 10.1109/EuroSP.2017.37 – volume: 17 start-page: 201 year: 2018 ident: ref69 article-title: Addressing key challenges to making enterprise blockchain applications a reality publication-title: MIS Quart. Executive – ident: ref254 doi: 10.1109/ACCESS.2017.2757955 – ident: ref81 doi: 10.2139/ssrn.2853428 – year: 2016 ident: ref163 article-title: Privacy on the blockchain: Unique ring signatures – ident: ref19 doi: 10.1145/792704.792706 – ident: ref240 doi: 10.1109/EUROCON.2017.8011213 – ident: ref129 doi: 10.1117/12.2266994 – year: 2018 ident: ref26 article-title: Cybersecurity framework – ident: ref236 doi: 10.1016/j.jclepro.2020.124405 – ident: ref118 doi: 10.1016/j.ins.2018.10.024 – ident: ref31 doi: 10.1007/978-3-662-54455-6_8 – ident: ref160 doi: 10.1109/TITS.2017.2777990 – year: 2016 ident: ref170 article-title: Privacy-awareness in Blockchain-based PKI – ident: ref228 doi: 10.1109/TITS.2004.837824 – ident: ref158 doi: 10.1007/978-3-030-03329-3_15 – ident: ref106 doi: 10.1145/3124441 – ident: ref148 doi: 10.1007/978-3-662-53357-4_4 – ident: ref38 doi: 10.1007/978-3-319-89722-6_10 – ident: ref174 doi: 10.1109/SP.2013.34 – ident: ref189 doi: 10.1007/978-3-319-67816-0_17 – ident: ref39 doi: 10.1145/3243734.3243780 – ident: ref122 doi: 10.1145/2517872.2517878 – ident: ref145 doi: 10.1016/j.compeleceng.2018.10.015 – ident: ref205 doi: 10.1145/3167086 – ident: ref171 doi: 10.1007/BF02351717 – ident: ref247 doi: 10.1109/MIS.2010.79 – ident: ref144 doi: 10.1109/INFOCOM.2018.8485890 – start-page: 65 volume-title: Proc. 15th USENIX Symp. Netw. Syst. Des. Implementation ident: ref176 article-title: zkLedger: Privacy- preserving auditing for distributed ledgers – ident: ref200 doi: 10.1109/TII.2017.2738842 – ident: ref117 doi: 10.4018/978-1-59140-557-3.ch189 – year: 2016 ident: ref214 article-title: ECDSA security in bitcoin and ethereum: A research survey – ident: ref88 doi: 10.1007/978-3-319-59665-5_15 – ident: ref149 doi: 10.1007/978-3-319-66399-9_25 – ident: ref159 doi: 10.1145/3005745.3005771 – ident: ref192 doi: 10.1145/1315245.1315317 – ident: ref86 doi: 10.1109/TSC.2018.2876846 – ident: ref216 doi: 10.3390/technologies7010028 – year: 2013 ident: ref22 article-title: Security in depth reference architecture – ident: ref141 doi: 10.1109/ACCESS.2018.2844400 – ident: ref54 doi: 10.1109/HPCC-SmartCity-DSS.2016.0198 – ident: ref108 doi: 10.1007/3-540-45760-7_17 – ident: ref242 doi: 10.1109/ISEASP.2017.7976994 – ident: ref96 doi: 10.5220/0006270005590566 – ident: ref16 doi: 10.1016/j.tele.2018.11.006 – ident: ref119 doi: 10.1007/978-3-662-58820-8_18 – ident: ref232 doi: 10.1007/978-1-4614-4139-7_10 – ident: ref40 doi: 10.1145/2993600.2993611 – ident: ref74 doi: 10.1186/s40854-016-0034-9 – ident: ref143 doi: 10.14722/ndss.2014.23298 – year: 2013 ident: ref146 article-title: Searchable encryption: A technology for supporting secure application – ident: ref168 doi: 10.1016/j.procs.2018.03.063 – ident: ref187 doi: 10.1145/3212998 – ident: ref66 doi: 10.1007/s12652-018-0881-5 – ident: ref177 doi: 10.1145/3133956.3134010 – ident: ref224 doi: 10.1016/0142-0615(83)90023-6 – year: 2015 ident: ref165 article-title: Ring signature confidential transactions for monero – ident: ref92 doi: 10.1007/978-3-319-46568-5_53 – ident: ref91 doi: 10.1002/sec.1748 – ident: ref89 doi: 10.1109/SMARTCOMP.2018.00074 – ident: ref194 doi: 10.1007/978-3-319-69084-1_19 – ident: ref3 doi: 10.1109/TSMC.2018.2854904 – ident: ref132 doi: 10.1109/CCGRID.2017.111 – ident: ref80 doi: 10.2139/ssrn.2849251 – ident: ref11 doi: 10.1111/j.1365-2575.2006.00219.x – ident: ref188 doi: 10.1007/978-3-319-63688-7_12 – ident: ref166 doi: 10.1109/COMPSAC.2016.142 – ident: ref75 doi: 10.1186/s40854-016-0031-z – year: 2017 ident: ref153 article-title: Threshold signatures for blockchain systems |
| SSID | ssj0062889 |
| Score | 2.6556048 |
| Snippet | Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2)... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2490 |
| SubjectTerms | Algorithms Blockchain Blockchain security Business Computation Computer architecture consensus algorithm Cryptography data security Data transmission Encryption Information systems Organizations process security Security smart contract Smart contracts |
| Title | Blockchain Security: A Survey of Techniques and Research Directions |
| URI | https://ieeexplore.ieee.org/document/9271868 https://www.proquest.com/docview/2698813537 |
| Volume | 15 |
| WOSCitedRecordID | wos000836642800054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2372-0204 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0062889 issn: 1939-1374 databaseCode: RIE dateStart: 20080101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB7aIqIHH61ifbEHL4Kxm-dkvdVi8SBFaJDewmazQVFa6Qv8985uk6IogqfksBvCzmZmvuzM9wFcYBb7PqrYMVTeTmDIhjLX1LjnSgcCMze0fdxPDzgYxKOReKzB1boXRmtti8_0tbm1Z_n5RC3Mr7KO8NCwu9ehjoirXq3K6xrVXFEdQ3LRSYY9An8eYVLux1Hgfgs7Vkflh_O1EaW_-7932YOdMnNk3ZWp96Gmx03YrArXm7D9hVqwBb1bilKv6pmAPxuWGnU3rMuGi-lSf7BJwZKKvXXG5DhnVQkeK50g7cYDSPp3Se_eKQUTHOUJd-4ESBGPEhwfPamk5FIJTXCNUijXlSrEIuKa01VhkPEik1FQZJEm0FUI5EXkH0JjPBnrI2AqdDH3UNBDMJCUgAtK3MIwVFFGiEqINnSq5UxVSSZuNC3eUgsquEjJAKkxQFoaoA2X6xnvKyKNP8a2zIKvx5Vr3YbTymJp-aXNUi8ScWzEO_D491knsOWZlgVbYnsKjfl0oc9gQy3nL7Ppud1En52-w5A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5qFR8HH61iteoevAjGZjebbNZbLZaKtQgN0ltINhsUpZW-wH_vbJoURRE8JYfdEHY2M_NlZ74P4FzEvuMI5VuGytvihmwopqbGPVGaSxFTN-vjfuqKXs8fDORjCS6XvTBa66z4TF-Z2-wsPxmpmflV1pBMGHb3FVh1OWd00a1V-F2jmyuLg0hbNoJ-C-EfQ1RqO77H6bfAkymp_HC_WUxp7_zvbXZhO88dSXNh7D0o6WEF1ovS9QpsfSEXrELrBuPUq3pG6E_6uUrdNWmS_mw81x9klJKg4G-dkGiYkKIIj-RuEPfjPgTt26DVsXLJBEsxSacWFxjzMMVxBItUFNmRkhoBGyZRlEbKFalnaxuvSvDYTuPI42nsaYRdqRR26jkHUB6OhvoQiHKpSJiQ-BDBI0zBJaZurusqL0ZMJWUNGsVyhiqnEzeqFm9hBitsGaIBQmOAMDdADS6WM94XVBp_jK2aBV-Oy9e6BvXCYmH-rU1C5knfN_Id4uj3WWew0QkeumH3rnd_DJvMNDBkBbd1KE_HM30Ca2o-fZmMT7MN9Qn0v8bX |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain+Security%3A+A+Survey+of+Techniques+and+Research+Directions&rft.jtitle=IEEE+transactions+on+services+computing&rft.au=Leng%2C+Jiewu&rft.au=Zhou%2C+Man&rft.au=Zhao%2C+J.+Leon&rft.au=Huang%2C+Yongfeng&rft.date=2022-07-01&rft.issn=1939-1374&rft.eissn=2372-0204&rft.volume=15&rft.issue=4&rft.spage=2490&rft.epage=2510&rft_id=info:doi/10.1109%2FTSC.2020.3038641&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSC_2020_3038641 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-1374&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-1374&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-1374&client=summon |