Blockchain Security: A Survey of Techniques and Research Directions

Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access sec...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on services computing Ročník 15; číslo 4; s. 2490 - 2510
Hlavní autoři: Leng, Jiewu, Zhou, Man, Zhao, J. Leon, Huang, Yongfeng, Bian, Yiyang
Médium: Journal Article
Jazyk:angličtina
Vydáno: Piscataway IEEE 01.07.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:1939-1374, 2372-0204
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access security, and 4) automated smart contracts for data programming and operations. However, the progress and promotion of Blockchain have been seriously impeded by various security issues in blockchain-based applications. Furthermore, previous research on blockchain security has been mostly technical, overlooking considerable business, organizational, and operational issues. To address this research gap from the perspective of information systems, we review blockchain security research in three levels, namely, the process level, the data level, and the infrastructure level, which we refer to as the PDI model of blockchain security. In this survey, we examine the state of blockchain security in the literature. Based on the insights obtained from this initial analysis, we then suggest future directions of research in blockchain security, shedding light on urgent business and industrial concerns in related computing disciplines.
AbstractList Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access security, and 4) automated smart contracts for data programming and operations. However, the progress and promotion of Blockchain have been seriously impeded by various security issues in blockchain-based applications. Furthermore, previous research on blockchain security has been mostly technical, overlooking considerable business, organizational, and operational issues. To address this research gap from the perspective of information systems, we review blockchain security research in three levels, namely, the process level, the data level, and the infrastructure level, which we refer to as the PDI model of blockchain security. In this survey, we examine the state of blockchain security in the literature. Based on the insights obtained from this initial analysis, we then suggest future directions of research in blockchain security, shedding light on urgent business and industrial concerns in related computing disciplines.
Author Bian, Yiyang
Zhao, J. Leon
Huang, Yongfeng
Zhou, Man
Leng, Jiewu
Author_xml – sequence: 1
  givenname: Jiewu
  orcidid: 0000-0003-4068-3910
  surname: Leng
  fullname: Leng, Jiewu
  email: jwleng@gdut.edu.cn
  organization: State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment, Guangdong University of Technology, Guangzhou, Guangdong, China
– sequence: 2
  givenname: Man
  surname: Zhou
  fullname: Zhou, Man
  email: theoggw@163.com
  organization: State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment, Guangdong University of Technology, Guangzhou, Guangdong, China
– sequence: 3
  givenname: J. Leon
  surname: Zhao
  fullname: Zhao, J. Leon
  email: leonzhao@cuhk.edu.cn
  organization: School of Management and Economics, Chinese University of Hong Kong, Shenzhen, China
– sequence: 4
  givenname: Yongfeng
  orcidid: 0000-0002-5190-9535
  surname: Huang
  fullname: Huang, Yongfeng
  email: cz_hyf@163.com
  organization: School of Computer Engineering, Jiangsu University of Technology, Changzhou, Jiangsu, China
– sequence: 5
  givenname: Yiyang
  orcidid: 0000-0002-1821-2699
  surname: Bian
  fullname: Bian, Yiyang
  email: bianyiyang@nju.edu.cn
  organization: Department of Information Management and Information Systems, Nanjing University, Nanjing, Jiangsu, China
BookMark eNp9kEtLAzEUhYNUsFb3gpuA66l5NQ93tT6hINjZhzS9oal1piYzQv-9M7S4cOHqwOWee879ztGgqitA6IqSMaXE3JaL2ZgRRsaccC0FPUFDxhUrupEYoCE13BSUK3GGznPeECKZ1maIZvfb2n_4tYsVXoBvU2z2d3iKF236hj2uAy7Br6v41ULGrlrhd8jgkl_jh5jAN7Gu8gU6DW6b4fKoI1Q-PZazl2L-9vw6m84LzwxtCqEAVlKIrpXzzhHnDSiqKJlQ6vxEBUmAdOqVWJKwdFKEpQSmWTCKBMlH6OZwdpfqvk5jN3Wbqi7RMmm0pnzCVbdFDls-1TknCHaX4qdLe0uJ7UnZjpTtSdkjqc4i_1h8bFz_WpNc3P5nvD4YIwD85himqJaa_wCYNna_
CODEN ITSCAD
CitedBy_id crossref_primary_10_1016_j_ipm_2023_103412
crossref_primary_10_1109_COMST_2023_3315374
crossref_primary_10_1109_TII_2023_3325057
crossref_primary_10_1016_j_eswa_2025_127815
crossref_primary_10_1016_j_compind_2022_103789
crossref_primary_10_1016_j_aei_2025_103179
crossref_primary_10_1109_JIOT_2025_3554573
crossref_primary_10_1007_s12083_023_01613_7
crossref_primary_10_1016_j_jmsy_2022_09_017
crossref_primary_10_1155_2022_2069195
crossref_primary_10_1007_s10586_022_03668_2
crossref_primary_10_1109_TCSS_2021_3129259
crossref_primary_10_3390_fi15040121
crossref_primary_10_1016_j_jnca_2025_104171
crossref_primary_10_1007_s42979_024_03487_9
crossref_primary_10_1109_JIOT_2025_3572962
crossref_primary_10_1155_2022_8265140
crossref_primary_10_1155_2022_1834873
crossref_primary_10_1109_TII_2022_3215606
crossref_primary_10_1155_2022_2410455
crossref_primary_10_1155_2022_6144664
crossref_primary_10_1016_j_aei_2022_101791
crossref_primary_10_1109_TIFS_2025_3597223
crossref_primary_10_1109_ACCESS_2022_3205019
crossref_primary_10_1007_s10586_022_03696_y
crossref_primary_10_1016_j_grets_2025_100169
crossref_primary_10_1007_s10586_022_03616_0
crossref_primary_10_3390_informatics12020043
crossref_primary_10_1016_j_iref_2023_07_053
crossref_primary_10_3390_app15074037
crossref_primary_10_1038_s41598_022_12412_0
crossref_primary_10_1109_TCE_2024_3371501
crossref_primary_10_1007_s42452_021_04909_6
crossref_primary_10_1016_j_iot_2025_101684
crossref_primary_10_3390_math12060830
crossref_primary_10_1109_JSEN_2023_3322535
crossref_primary_10_1002_qute_202300096
crossref_primary_10_1038_s41598_024_83399_z
crossref_primary_10_1109_ACCESS_2024_3431279
crossref_primary_10_3390_sym15040924
crossref_primary_10_1016_j_engappai_2023_107606
crossref_primary_10_3390_electronics12173592
crossref_primary_10_1016_j_cosrev_2024_100696
crossref_primary_10_32604_cmc_2024_053077
crossref_primary_10_1109_LSENS_2024_3482177
crossref_primary_10_1016_j_future_2024_107655
crossref_primary_10_1109_TSC_2025_3577505
crossref_primary_10_3390_s24124022
crossref_primary_10_1007_s10586_024_04737_4
crossref_primary_10_1016_j_comnet_2025_111123
crossref_primary_10_3390_foods13223607
crossref_primary_10_1080_00207543_2022_2089929
crossref_primary_10_3390_app14010139
crossref_primary_10_1016_j_eswa_2021_115101
crossref_primary_10_1145_3705296
crossref_primary_10_3390_pr13082622
crossref_primary_10_1016_j_jmsy_2023_08_023
crossref_primary_10_1109_TII_2023_3282319
crossref_primary_10_1016_j_procs_2025_04_337
crossref_primary_10_3390_jtaer18010008
crossref_primary_10_3390_s22218400
crossref_primary_10_3390_cryptography8020012
crossref_primary_10_1016_j_bcra_2024_100257
crossref_primary_10_1016_j_jii_2023_100456
crossref_primary_10_1038_s41598_022_19138_z
crossref_primary_10_1109_ACCESS_2022_3188123
crossref_primary_10_1038_s41598_024_78995_y
crossref_primary_10_1109_TMC_2024_3357499
crossref_primary_10_3390_buildings14061600
crossref_primary_10_1016_j_future_2025_107731
crossref_primary_10_1007_s10664_025_10623_3
crossref_primary_10_1007_s12652_024_04801_2
crossref_primary_10_1155_2022_1987933
crossref_primary_10_1109_JIOT_2025_3583408
crossref_primary_10_1109_TMC_2024_3475481
crossref_primary_10_1109_TSMC_2023_3257172
crossref_primary_10_1049_blc2_12077
crossref_primary_10_4018_IJBASC_369334
crossref_primary_10_1007_s11227_024_06715_4
crossref_primary_10_1109_TSC_2025_3544130
crossref_primary_10_3390_app12189184
crossref_primary_10_1109_TNSE_2023_3344158
crossref_primary_10_1109_TCE_2024_3426101
crossref_primary_10_1109_JIOT_2024_3426536
crossref_primary_10_1109_TCSS_2024_3516144
crossref_primary_10_3390_electronics13163116
crossref_primary_10_1007_s11227_021_03841_1
crossref_primary_10_1016_j_jnca_2023_103795
crossref_primary_10_1016_j_future_2024_05_003
crossref_primary_10_1007_s11227_025_07718_5
crossref_primary_10_1016_j_comnet_2025_111274
crossref_primary_10_1016_j_comnet_2025_111438
crossref_primary_10_1109_TCSS_2024_3395467
crossref_primary_10_1108_K_05_2021_0384
crossref_primary_10_1371_journal_pone_0302145
crossref_primary_10_1109_TSC_2024_3440012
crossref_primary_10_1145_3721140
crossref_primary_10_1038_s40494_025_01818_4
crossref_primary_10_1016_j_suscom_2025_101101
crossref_primary_10_1109_TCYB_2024_3403923
crossref_primary_10_1145_3768318
crossref_primary_10_1007_s11277_024_11694_z
crossref_primary_10_1109_TMC_2025_3565898
crossref_primary_10_1002_cpe_70120
crossref_primary_10_1155_2022_5842371
crossref_primary_10_1109_OJCOMS_2024_3356076
crossref_primary_10_3390_app122110794
crossref_primary_10_1016_j_future_2023_08_021
crossref_primary_10_1109_JAS_2023_123642
crossref_primary_10_3390_machines10100858
Cites_doi 10.1109/IC2E.2018.00069
10.1007/978-3-540-74143-5_30
10.1109/ACCESS.2017.2730843
10.1109/ACCESS.2017.2782733
10.1109/TII.2012.2198666
10.1016/j.future.2018.07.042
10.1016/j.knosys.2017.07.023
10.1109/COMST.2015.2388550
10.1007/s00453-016-0221-0
10.1119/1.1891170
10.1007/978-3-642-32009-5_12
10.2139/ssrn.2646618
10.7249/rr2223
10.1007/978-3-319-70972-7_20
10.1145/2976749.2978362
10.1109/ACCESS.2018.2799854
10.1109/TDSC.2016.2616861
10.1016/j.dcan.2019.01.005
10.1109/ICRITO.2017.8342399
10.1007/978-3-662-48000-7_29
10.1145/3098954.3098958
10.1109/ICOIN.2018.8343266
10.1109/MSP.2006.167
10.1016/j.knosys.2016.03.008
10.1016/j.elerap.2018.03.005
10.1109/ACCESS.2018.2847632
10.3390/s18082575
10.1109/CCGRID.2017.8
10.1016/j.clsr.2017.05.007
10.1145/3012704
10.1007/s10257-018-0377-z
10.1145/2976749.2978309
10.1186/s40854-016-0049-2
10.1016/j.future.2017.08.020
10.1109/EuroSPW.2017.48
10.1109/ICCNC.2018.8390265
10.1109/MITP.2017.3051335
10.1007/0-387-34805-0_46
10.3934/mfc.2018007
10.1016/j.clsr.2009.11.008
10.1002/spy2.97
10.1109/COMST.2017.2771153
10.1145/2994581
10.1109/ACCESS.2018.2809426
10.1109/ARES.2008.33
10.1007/978-3-319-70278-0_31
10.1109/NOMS.2018.8406309
10.1145/3243734.3243853
10.1007/978-3-662-58387-6_28
10.1080/17517575.2018.1470259
10.1007/bf00196725
10.1016/j.jmsy.2020.04.012
10.1109/SP.2018.00018
10.1016/j.future.2018.09.019
10.1109/TKDE.2017.2781227
10.1145/2896386
10.1109/NCA.2017.8171384
10.1016/0378-7206(91)90024-v
10.1109/DSN.2019.00063
10.1007/978-3-319-94478-4_9
10.1080/0951192x.2019.1667032
10.1016/j.adhoc.2018.11.010
10.1145/3186727
10.1049/iet-ifs.2011.0094
10.1007/s11036-017-0872-3
10.1109/ACCESS.2018.2801266
10.1109/SP.2017.29
10.1109/SERVICES.2017.23
10.1109/ICCE.2016.7430693
10.1109/NAPS.2017.8107313
10.1109/ICACCS.2017.8014672
10.1109/SP.2016.55
10.23919/MIPRO.2018.8400278
10.1155/2017/4746586
10.1007/978-981-10-7605-3_50
10.1109/MSP.2018.3111245
10.1145/2660267.2660379
10.1016/j.ins.2018.06.071
10.1109/ACCESS.2017.2788411
10.1109/ACCESS.2018.2812176
10.1109/SFCS.1982.38
10.1155/2018/5978636
10.1109/COMST.2018.2863956
10.1080/00207543.2018.1471243
10.1109/SPW.2015.27
10.1145/2976749.2978303
10.7717/peerj-cs.114
10.1177/1063293X16666312
10.6633/IJNS.201709.19(5).01
10.1007/s10845-017-1301-y
10.1145/571637.571640
10.14569/IJACSA.2017.080757
10.1016/j.rcim.2019.101895
10.1016/j.procs.2018.01.019
10.1007/s10257-017-0362-y
10.1109/INFOCOM.2018.8486401
10.1109/IWBOSE.2018.8327565
10.1109/TSMC.2019.2930418
10.3390/app9091788
10.1088/2058-9565/aabc6b
10.1145/2695533.2695545
10.1108/JFRC-08-2016-0068
10.1145/3007788.3007790
10.1145/1216218.1216224
10.1109/SOSE.2017.32
10.1016/S1361-3723(05)70275-X
10.1007/978-3-319-48965-0_9
10.1186/s40854-016-0039-4
10.1016/j.jclepro.2019.06.265
10.1109/ANTS.2017.8384164
10.1109/IJCNN.2018.8489377
10.1109/MCC.2018.011791712
10.1007/s00145-007-9006-6
10.1109/MCOM.2017.1700879
10.1007/978-3-642-14623-7_25
10.1007/978-3-319-93638-3_32
10.1145/3302505.3310086
10.1109/ICCCN.2018.8487349
10.1109/SP.2014.36
10.1109/CVCBT.2018.00014
10.1007/3-540-46766-1_9
10.1109/CompComm.2016.7924656
10.4236/jsea.2016.910036
10.1109/COMST.2015.2494502
10.1016/j.rser.2020.110112
10.1108/09685229910292817
10.1109/MCC.2017.3791019
10.1155/2018/9641273
10.1109/JIOT.2017.2740569
10.1108/scm-03-2018-0143
10.1109/ICSAI.2017.8248427
10.1109/HiPCW.2018.8634280
10.1007/3-540-45496-9_20
10.2308/isys-51804
10.1145/2976749.2978341
10.1145/2976749.2978326
10.1007/978-3-662-53357-4_6
10.1504/ijwgs.2018.10016848
10.1109/MNET.2018.1700344
10.3390/sym9080164
10.1016/0167-4048(93)90110-Q
10.1007/s11227-016-1870-0
10.1145/359340.359342
10.1007/11426639_27
10.1007/978-3-540-27800-9_28
10.1016/j.ins.2018.06.018
10.1007/s12083-016-0456-1
10.1016/S0167-4048(03)00413-9
10.1109/EuroSP.2017.37
10.1109/ACCESS.2017.2757955
10.2139/ssrn.2853428
10.1145/792704.792706
10.1109/EUROCON.2017.8011213
10.1117/12.2266994
10.1016/j.jclepro.2020.124405
10.1016/j.ins.2018.10.024
10.1007/978-3-662-54455-6_8
10.1109/TITS.2017.2777990
10.1109/TITS.2004.837824
10.1007/978-3-030-03329-3_15
10.1145/3124441
10.1007/978-3-662-53357-4_4
10.1007/978-3-319-89722-6_10
10.1109/SP.2013.34
10.1007/978-3-319-67816-0_17
10.1145/3243734.3243780
10.1145/2517872.2517878
10.1016/j.compeleceng.2018.10.015
10.1145/3167086
10.1007/BF02351717
10.1109/MIS.2010.79
10.1109/INFOCOM.2018.8485890
10.1109/TII.2017.2738842
10.4018/978-1-59140-557-3.ch189
10.1007/978-3-319-59665-5_15
10.1007/978-3-319-66399-9_25
10.1145/3005745.3005771
10.1145/1315245.1315317
10.1109/TSC.2018.2876846
10.3390/technologies7010028
10.1109/ACCESS.2018.2844400
10.1109/HPCC-SmartCity-DSS.2016.0198
10.1007/3-540-45760-7_17
10.1109/ISEASP.2017.7976994
10.5220/0006270005590566
10.1016/j.tele.2018.11.006
10.1007/978-3-662-58820-8_18
10.1007/978-1-4614-4139-7_10
10.1145/2993600.2993611
10.1186/s40854-016-0034-9
10.14722/ndss.2014.23298
10.1016/j.procs.2018.03.063
10.1145/3212998
10.1007/s12652-018-0881-5
10.1145/3133956.3134010
10.1016/0142-0615(83)90023-6
10.1007/978-3-319-46568-5_53
10.1002/sec.1748
10.1109/SMARTCOMP.2018.00074
10.1007/978-3-319-69084-1_19
10.1109/TSMC.2018.2854904
10.1109/CCGRID.2017.111
10.2139/ssrn.2849251
10.1111/j.1365-2575.2006.00219.x
10.1007/978-3-319-63688-7_12
10.1109/COMPSAC.2016.142
10.1186/s40854-016-0031-z
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TSC.2020.3038641
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Business
EISSN 2372-0204
EndPage 2510
ExternalDocumentID 10_1109_TSC_2020_3038641
9271868
Genre orig-research
GrantInformation_xml – fundername: Shenzhen Special Fund for the Development of Strategic Emerging Industries
  grantid: JCYJ20170818100156260
– fundername: National Natural Science Foundation of China
  grantid: 52075107; 71932002
  funderid: 10.13039/501100001809
– fundername: National Key Research and Development Program of China
  grantid: 2018AAA0101700
– fundername: S&T Planning Project of Guangdong Province
  grantid: 2019A050503010
– fundername: S&T Planning Project of Sichuan Province
  grantid: 2019-YF05-02050-GX; 2020YFSY0061
GroupedDBID 0R~
29I
4.4
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNI
RNS
RZB
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-47eed644372acaa0ac9e71710511ac57f60e0c57c74b0fba64fb6e282f970f63
IEDL.DBID RIE
ISICitedReferencesCount 198
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000836642800054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-1374
IngestDate Sun Nov 09 08:11:25 EST 2025
Tue Nov 18 22:27:48 EST 2025
Sat Nov 29 02:04:35 EST 2025
Wed Aug 27 02:23:34 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-47eed644372acaa0ac9e71710511ac57f60e0c57c74b0fba64fb6e282f970f63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5190-9535
0000-0003-4068-3910
0000-0002-1821-2699
PQID 2698813537
PQPubID 85503
PageCount 21
ParticipantIDs proquest_journals_2698813537
crossref_primary_10_1109_TSC_2020_3038641
crossref_citationtrail_10_1109_TSC_2020_3038641
ieee_primary_9271868
PublicationCentury 2000
PublicationDate 2022-07-01
PublicationDateYYYYMMDD 2022-07-01
PublicationDate_xml – month: 07
  year: 2022
  text: 2022-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on services computing
PublicationTitleAbbrev TSC
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref56
ref208
ref59
ref205
ref58
ref53
ref52
ref204
ref55
ref201
ref54
(ref26) 2018
ref51
ref50
ref46
ref218
ref45
ref48
ref216
ref47
ref217
ref42
ref41
ref215
ref44
ref212
ref43
ref213
ref49
ref8
Li (ref140) 2017
ref7
ref9
ref4
ref3
ref6
ref100
ref221
ref222
ref40
Noether (ref165) 2015
ref35
ref34
ref37
ref36
ref31
ref30
ref33
ref32
Darwin (ref21) 2010
ref39
ref38
Gentry (ref102) 2009
ref20
Nakamoto (ref1) 2008
ref28
ref27
ref29
Fan (ref202)
Stathakopoulous (ref153) 2017
ref200
Hisayoshi (ref146) 2013
Mayer (ref214) 2016
ref128
ref249
ref129
ref97
ref126
ref247
ref96
ref248
ref99
ref245
ref98
ref246
Chappelle (ref22) 2013
Noyes (ref220) 2016
ref93
ref133
ref254
Crosby (ref5) 2016; 6
ref92
ref255
ref95
ref131
ref252
ref94
ref132
ref253
ref250
ref91
ref90
ref89
ref139
Lamport (ref206) 2001; 32
Schwartz (ref196) 2014
ref86
ref137
ref258
ref85
ref138
ref259
ref88
ref135
ref256
ref87
ref136
ref257
Mercer (ref163) 2016
Hardjono (ref178) 2019
ref82
ref144
ref81
ref145
ref142
ref83
ref143
ref141
ref80
ref79
ref108
ref229
ref78
ref109
ref106
ref107
ref228
ref75
ref104
ref225
ref74
ref105
ref226
ref77
ref223
ref76
ref103
ref224
Brandenburger (ref125) 2018
Teutsch (ref120) 2019
ref71
ref111
ref232
ref70
ref112
ref73
ref230
ref72
ref110
ref231
ref68
ref119
ref67
ref117
ref238
ref118
ref239
ref64
ref236
ref63
ref237
ref66
ref234
ref65
ref114
Kwon (ref210) 2014
Wu (ref182)
Meltzer (ref25) 2017
Yang (ref251) 2018
ref60
ref122
ref243
ref123
ref244
ref62
ref241
ref61
ref121
ref242
Cachin (ref211) 2017
ref240
Kerber (ref124) 2012
ref168
Du (ref199)
ref177
Lacity (ref69) 2018; 17
ref175
ref174
ref171
ref172
ref179
ref180
ref181
ref188
ref189
Mazières (ref209) 2015
ref186
ref187
ref184
ref185
ref183
Dai (ref84) 2017; 87
ref148
ref149
ref147
Duffield (ref161) 2015
van Saberhagen (ref169) 2013
ref155
ref156
ref154
ref151
Lazarovich (ref134) 2015
ref150
Tudor (ref18) 2000
Ramachandran (ref130) 2017
ref159
ref157
ref158
Narula (ref176)
Atallah (ref113) 2011
ref166
ref167
ref164
Zyskind (ref115) 2015
ref162
ref160
ref13
Ben-Sasson (ref173) 2018; 46
ref12
Heilman (ref219)
ref15
ref14
ref11
ref10
ref17
ref16
ref19
Gaetani (ref235)
Goldfeder (ref152) 2015
(ref116) 2018
(ref101) 2017
ref2
Liu (ref203)
Howard (ref207) 2014
(ref24) 2017
ref191
ref192
Fleder (ref233) 2015
ref190
ref197
ref195
ref193
ref194
(ref23) 2013
Fiore (ref127)
Wahab (ref227) 2018
(ref198) 2017
Axon (ref170) 2016
References_xml – volume-title: CIS
  year: 2017
  ident: ref24
  article-title: CIS critical security controls
– ident: ref111
  doi: 10.1109/IC2E.2018.00069
– ident: ref139
  doi: 10.1007/978-3-540-74143-5_30
– year: 2017
  ident: ref140
  article-title: A searchable symmetric encryption scheme using blockchain
– ident: ref135
  doi: 10.1109/ACCESS.2017.2730843
– ident: ref94
  doi: 10.1109/ACCESS.2017.2782733
– year: 2014
  ident: ref210
  article-title: Tendermint: Consensus without mining
– ident: ref45
  doi: 10.1109/TII.2012.2198666
– ident: ref87
  doi: 10.1016/j.future.2018.07.042
– ident: ref256
  doi: 10.1016/j.knosys.2017.07.023
– ident: ref50
  doi: 10.1109/COMST.2015.2388550
– year: 2015
  ident: ref233
  article-title: Bitcoin transaction graph analysis
– year: 2017
  ident: ref211
  article-title: Blockchain consensus protocols in the wild
– ident: ref181
  doi: 10.1007/s00453-016-0221-0
– ident: ref243
  doi: 10.1119/1.1891170
– ident: ref98
  doi: 10.1007/978-3-642-32009-5_12
– ident: ref71
  doi: 10.2139/ssrn.2646618
– ident: ref79
  doi: 10.7249/rr2223
– start-page: 2567
  volume-title: Proc. IEEE Int. Conf. Syst., Man, Cybern.
  ident: ref199
  article-title: A review on consensus algorithm of blockchain
– year: 2018
  ident: ref227
  article-title: Privacy in blockchain systems
– ident: ref34
  doi: 10.1007/978-3-319-70972-7_20
– ident: ref32
  doi: 10.1145/2976749.2978362
– ident: ref83
  doi: 10.1109/ACCESS.2018.2799854
– ident: ref151
  doi: 10.1109/TDSC.2016.2616861
– ident: ref239
  doi: 10.1016/j.dcan.2019.01.005
– ident: ref14
  doi: 10.1109/ICRITO.2017.8342399
– year: 2015
  ident: ref209
  article-title: The stellar consensus protocol: A federated model for internet-level consensus
– year: 2010
  ident: ref21
  article-title: Security reference architecture
– ident: ref195
  doi: 10.1007/978-3-662-48000-7_29
– ident: ref72
  doi: 10.1145/3098954.3098958
– ident: ref184
  doi: 10.1109/ICOIN.2018.8343266
– ident: ref28
  doi: 10.1109/MSP.2006.167
– ident: ref237
  doi: 10.1016/j.knosys.2016.03.008
– ident: ref52
  doi: 10.1016/j.elerap.2018.03.005
– ident: ref104
  doi: 10.1109/ACCESS.2018.2847632
– ident: ref49
  doi: 10.3390/s18082575
– year: 2017
  ident: ref198
  article-title: The coco framework technical overview
– ident: ref131
  doi: 10.1109/CCGRID.2017.8
– ident: ref36
  doi: 10.1016/j.clsr.2017.05.007
– start-page: 129
  volume-title: Proc. 24th USENIX Secur. Symp.
  ident: ref219
  article-title: Eclipse attacks on bitcoins peer-to-peer network
– ident: ref230
  doi: 10.1145/3012704
– ident: ref7
  doi: 10.1007/s10257-018-0377-z
– ident: ref41
  doi: 10.1145/2976749.2978309
– ident: ref4
  doi: 10.1186/s40854-016-0049-2
– ident: ref13
  doi: 10.1016/j.future.2017.08.020
– year: 2017
  ident: ref101
  article-title: Building safe A.I.: A tutorial for encrypted deep learning
– ident: ref162
  doi: 10.1109/EuroSPW.2017.48
– ident: ref217
  doi: 10.1109/ICCNC.2018.8390265
– ident: ref48
  doi: 10.1109/MITP.2017.3051335
– ident: ref193
  doi: 10.1007/0-387-34805-0_46
– ident: ref10
  doi: 10.3934/mfc.2018007
– ident: ref47
  doi: 10.1016/j.clsr.2009.11.008
– ident: ref99
  doi: 10.1002/spy2.97
– ident: ref259
  doi: 10.1109/COMST.2017.2771153
– ident: ref2
  doi: 10.1145/2994581
– ident: ref109
  doi: 10.1109/ACCESS.2018.2809426
– ident: ref17
  doi: 10.1109/ARES.2008.33
– ident: ref29
  doi: 10.1007/978-3-319-70278-0_31
– ident: ref221
  doi: 10.1109/NOMS.2018.8406309
– ident: ref250
  doi: 10.1145/3243734.3243853
– year: 2009
  ident: ref102
  article-title: A fully homomorphic encryption scheme
– ident: ref33
  doi: 10.1007/978-3-662-58387-6_28
– ident: ref62
  doi: 10.1080/17517575.2018.1470259
– year: 2015
  ident: ref161
  article-title: Dash: A privacycentric cryptocurrency
– ident: ref180
  doi: 10.1007/bf00196725
– year: 2019
  ident: ref178
  article-title: Verifiable anonymous identities and access control in permissioned blockchains
– ident: ref64
  doi: 10.1016/j.jmsy.2020.04.012
– ident: ref123
  doi: 10.1109/SP.2018.00018
– ident: ref77
  doi: 10.1016/j.future.2018.09.019
– ident: ref76
  doi: 10.1109/TKDE.2017.2781227
– ident: ref112
  doi: 10.1145/2896386
– ident: ref133
  doi: 10.1109/NCA.2017.8171384
– ident: ref225
  doi: 10.1016/0378-7206(91)90024-v
– ident: ref248
  doi: 10.1109/DSN.2019.00063
– ident: ref95
  doi: 10.1007/978-3-319-94478-4_9
– ident: ref59
  doi: 10.1080/0951192x.2019.1667032
– year: 2012
  ident: ref124
  article-title: Verifiable computation on ethereum
– start-page: 485
  volume-title: Proc. 12th USENIX Symp. Operating Syst. Des. Implementation
  ident: ref203
  article-title: XFT: Practical fault tolerance beyond crashes
– ident: ref258
  doi: 10.1016/j.adhoc.2018.11.010
– ident: ref231
  doi: 10.1145/3186727
– ident: ref155
  doi: 10.1049/iet-ifs.2011.0094
– ident: ref121
  doi: 10.1007/s11036-017-0872-3
– ident: ref157
  doi: 10.1109/ACCESS.2018.2801266
– ident: ref218
  doi: 10.1109/SP.2017.29
– ident: ref137
  doi: 10.1109/SERVICES.2017.23
– ident: ref197
  doi: 10.1109/ICCE.2016.7430693
– ident: ref56
  doi: 10.1109/NAPS.2017.8107313
– ident: ref204
  doi: 10.1109/ICACCS.2017.8014672
– ident: ref179
  doi: 10.1109/SP.2016.55
– ident: ref183
  doi: 10.23919/MIPRO.2018.8400278
– ident: ref150
  doi: 10.1155/2017/4746586
– ident: ref105
  doi: 10.1007/978-981-10-7605-3_50
– ident: ref212
  doi: 10.1109/MSP.2018.3111245
– ident: ref215
  doi: 10.1145/2660267.2660379
– ident: ref253
  doi: 10.1016/j.ins.2018.06.071
– year: 2019
  ident: ref120
  article-title: A scalable verification solution for blockchains
– ident: ref244
  doi: 10.1109/ACCESS.2017.2788411
– ident: ref57
  doi: 10.1109/ACCESS.2018.2812176
– ident: ref114
  doi: 10.1109/SFCS.1982.38
– ident: ref53
  doi: 10.1155/2018/5978636
– volume: 87
  year: 2017
  ident: ref84
  article-title: Blockchain: An emerging solution for fraud prevention
  publication-title: CPA J.
– ident: ref51
  doi: 10.1109/COMST.2018.2863956
– ident: ref65
  doi: 10.1080/00207543.2018.1471243
– year: 2017
  ident: ref130
  article-title: Using blockchain and smart contracts for secure data provenance management
– ident: ref90
  doi: 10.1109/SPW.2015.27
– ident: ref142
  doi: 10.1145/2976749.2978303
– ident: ref246
  doi: 10.7717/peerj-cs.114
– ident: ref255
  doi: 10.1177/1063293X16666312
– year: 2017
  ident: ref25
  article-title: Security reference architecture: A practical guide to implementing foundational controls
– ident: ref12
  doi: 10.6633/IJNS.201709.19(5).01
– ident: ref63
  doi: 10.1007/s10845-017-1301-y
– ident: ref201
  doi: 10.1145/571637.571640
– ident: ref93
  doi: 10.14569/IJACSA.2017.080757
– ident: ref61
  doi: 10.1016/j.rcim.2019.101895
– ident: ref6
  doi: 10.1016/j.procs.2018.01.019
– volume-title: Information Security Architecture
  year: 2000
  ident: ref18
– year: 2015
  ident: ref115
  article-title: Enigma: Decentralized computation platform with guaranteed privacy
– ident: ref241
  doi: 10.1007/s10257-017-0362-y
– ident: ref234
  doi: 10.1109/INFOCOM.2018.8486401
– volume: 46
  start-page: 1
  year: 2018
  ident: ref173
  article-title: Scalable, transparent, and post-quantum secure computational integrity
  publication-title: IACR Cryptol. ePrint Archive
– year: 2015
  ident: ref152
  article-title: Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme
– ident: ref35
  doi: 10.1109/IWBOSE.2018.8327565
– ident: ref67
  doi: 10.1109/TSMC.2019.2930418
– ident: ref186
  doi: 10.3390/app9091788
– ident: ref245
  doi: 10.1088/2058-9565/aabc6b
– ident: ref190
  doi: 10.1145/2695533.2695545
– ident: ref73
  doi: 10.1108/JFRC-08-2016-0068
– year: 2018
  ident: ref125
  article-title: Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric
– ident: ref191
  doi: 10.1145/3007788.3007790
– year: 2014
  ident: ref196
  article-title: The ripple protocol consensus algorithm
– year: 2008
  ident: ref1
  article-title: Bitcoin: A peer-to-peer electronic cash system
– start-page: 863
  volume-title: Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
  ident: ref127
  article-title: Verifiable delegation of computation on outsourced data
– ident: ref9
  doi: 10.1145/1216218.1216224
– start-page: 322
  volume-title: Proc. Int. Conf. Inf. Comput. Appl.
  year: 2011
  ident: ref113
  article-title: Research on secure multi-party computational geometry
– ident: ref128
  doi: 10.1109/SOSE.2017.32
– ident: ref20
  doi: 10.1016/S1361-3723(05)70275-X
– ident: ref147
  doi: 10.1007/978-3-319-48965-0_9
– ident: ref85
  doi: 10.1186/s40854-016-0039-4
– year: 2013
  ident: ref23
  article-title: ISO/IEC 27000 family - Information security management systems
– ident: ref58
  doi: 10.1016/j.jclepro.2019.06.265
– ident: ref97
  doi: 10.1109/ANTS.2017.8384164
– ident: ref136
  doi: 10.1109/IJCNN.2018.8489377
– volume: 6
  start-page: 1
  year: 2016
  ident: ref5
  article-title: BlockChain technology: Beyond bitcoin
  publication-title: Appl. Innov. Rev.
– year: 2015
  ident: ref134
  article-title: Invisible ink: Blockchain for data privacy
  publication-title: Doctoral dissertation, Massachusetts Institute of Technology
– ident: ref257
  doi: 10.1109/MCC.2018.011791712
– ident: ref138
  doi: 10.1007/s00145-007-9006-6
– ident: ref55
  doi: 10.1109/MCOM.2017.1700879
– ident: ref107
  doi: 10.1007/978-3-642-14623-7_25
– ident: ref167
  doi: 10.1007/978-3-319-93638-3_32
– volume: 32
  start-page: 18
  year: 2001
  ident: ref206
  article-title: Paxos made simple
  publication-title: ACM Sigact News
– ident: ref249
  doi: 10.1145/3302505.3310086
– ident: ref156
  doi: 10.1109/ICCCN.2018.8487349
– year: 2018
  ident: ref251
  article-title: LinBFT: Linear-communication byzantine fault tolerance for public blockchains
– ident: ref175
  doi: 10.1109/SP.2014.36
– ident: ref229
  doi: 10.1109/CVCBT.2018.00014
– ident: ref172
  doi: 10.1007/3-540-46766-1_9
– ident: ref126
  doi: 10.1109/CompComm.2016.7924656
– ident: ref46
  doi: 10.4236/jsea.2016.910036
– ident: ref238
  doi: 10.1109/COMST.2015.2494502
– ident: ref60
  doi: 10.1016/j.rser.2020.110112
– start-page: 675
  volume-title: Proc. 27th USENIX Secur. Symp.
  ident: ref182
  article-title: DIZK: A distributed zero knowledge proof system
– start-page: 245
  volume-title: Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng.
  ident: ref202
  article-title: Scalable practical byzantine fault tolerance with short-lived signature schemes
– ident: ref8
  doi: 10.1108/09685229910292817
– ident: ref70
  doi: 10.1109/MCC.2017.3791019
– ident: ref110
  doi: 10.1155/2018/9641273
– year: 2016
  ident: ref220
  article-title: Fast anti-malware by distributed blockchain consensus and feedforward scanning
– ident: ref213
  doi: 10.1109/JIOT.2017.2740569
– ident: ref42
  doi: 10.1108/scm-03-2018-0143
– year: 2018
  ident: ref116
  article-title: PlatON: A high-efficiency trustless computing network
– ident: ref30
  doi: 10.1109/ICSAI.2017.8248427
– ident: ref100
  doi: 10.1109/HiPCW.2018.8634280
– year: 2013
  ident: ref169
  article-title: CryptoNote v 2.0
– ident: ref208
  doi: 10.1007/3-540-45496-9_20
– ident: ref82
  doi: 10.2308/isys-51804
– ident: ref185
  doi: 10.1145/2976749.2978341
– ident: ref226
  doi: 10.1145/2976749.2978326
– ident: ref37
  doi: 10.1007/978-3-662-53357-4_6
– ident: ref43
  doi: 10.1504/ijwgs.2018.10016848
– ident: ref68
  doi: 10.1109/MNET.2018.1700344
– start-page: 1
  volume-title: Proc. Italian Conf. Cybersecurity
  ident: ref235
  article-title: Blockchain-based database to ensure data integrity in cloud computing environments
– ident: ref15
  doi: 10.3390/sym9080164
– ident: ref223
  doi: 10.1016/0167-4048(93)90110-Q
– ident: ref222
  doi: 10.1007/s11227-016-1870-0
– ident: ref103
  doi: 10.1145/359340.359342
– ident: ref154
  doi: 10.1007/11426639_27
– ident: ref164
  doi: 10.1007/978-3-540-27800-9_28
– ident: ref252
  doi: 10.1016/j.ins.2018.06.018
– year: 2014
  ident: ref207
  article-title: ARC: Analysis of raft consensus
– ident: ref44
  doi: 10.1007/s12083-016-0456-1
– ident: ref27
  doi: 10.1016/S0167-4048(03)00413-9
– ident: ref78
  doi: 10.1109/EuroSP.2017.37
– volume: 17
  start-page: 201
  year: 2018
  ident: ref69
  article-title: Addressing key challenges to making enterprise blockchain applications a reality
  publication-title: MIS Quart. Executive
– ident: ref254
  doi: 10.1109/ACCESS.2017.2757955
– ident: ref81
  doi: 10.2139/ssrn.2853428
– year: 2016
  ident: ref163
  article-title: Privacy on the blockchain: Unique ring signatures
– ident: ref19
  doi: 10.1145/792704.792706
– ident: ref240
  doi: 10.1109/EUROCON.2017.8011213
– ident: ref129
  doi: 10.1117/12.2266994
– year: 2018
  ident: ref26
  article-title: Cybersecurity framework
– ident: ref236
  doi: 10.1016/j.jclepro.2020.124405
– ident: ref118
  doi: 10.1016/j.ins.2018.10.024
– ident: ref31
  doi: 10.1007/978-3-662-54455-6_8
– ident: ref160
  doi: 10.1109/TITS.2017.2777990
– year: 2016
  ident: ref170
  article-title: Privacy-awareness in Blockchain-based PKI
– ident: ref228
  doi: 10.1109/TITS.2004.837824
– ident: ref158
  doi: 10.1007/978-3-030-03329-3_15
– ident: ref106
  doi: 10.1145/3124441
– ident: ref148
  doi: 10.1007/978-3-662-53357-4_4
– ident: ref38
  doi: 10.1007/978-3-319-89722-6_10
– ident: ref174
  doi: 10.1109/SP.2013.34
– ident: ref189
  doi: 10.1007/978-3-319-67816-0_17
– ident: ref39
  doi: 10.1145/3243734.3243780
– ident: ref122
  doi: 10.1145/2517872.2517878
– ident: ref145
  doi: 10.1016/j.compeleceng.2018.10.015
– ident: ref205
  doi: 10.1145/3167086
– ident: ref171
  doi: 10.1007/BF02351717
– ident: ref247
  doi: 10.1109/MIS.2010.79
– ident: ref144
  doi: 10.1109/INFOCOM.2018.8485890
– start-page: 65
  volume-title: Proc. 15th USENIX Symp. Netw. Syst. Des. Implementation
  ident: ref176
  article-title: zkLedger: Privacy- preserving auditing for distributed ledgers
– ident: ref200
  doi: 10.1109/TII.2017.2738842
– ident: ref117
  doi: 10.4018/978-1-59140-557-3.ch189
– year: 2016
  ident: ref214
  article-title: ECDSA security in bitcoin and ethereum: A research survey
– ident: ref88
  doi: 10.1007/978-3-319-59665-5_15
– ident: ref149
  doi: 10.1007/978-3-319-66399-9_25
– ident: ref159
  doi: 10.1145/3005745.3005771
– ident: ref192
  doi: 10.1145/1315245.1315317
– ident: ref86
  doi: 10.1109/TSC.2018.2876846
– ident: ref216
  doi: 10.3390/technologies7010028
– year: 2013
  ident: ref22
  article-title: Security in depth reference architecture
– ident: ref141
  doi: 10.1109/ACCESS.2018.2844400
– ident: ref54
  doi: 10.1109/HPCC-SmartCity-DSS.2016.0198
– ident: ref108
  doi: 10.1007/3-540-45760-7_17
– ident: ref242
  doi: 10.1109/ISEASP.2017.7976994
– ident: ref96
  doi: 10.5220/0006270005590566
– ident: ref16
  doi: 10.1016/j.tele.2018.11.006
– ident: ref119
  doi: 10.1007/978-3-662-58820-8_18
– ident: ref232
  doi: 10.1007/978-1-4614-4139-7_10
– ident: ref40
  doi: 10.1145/2993600.2993611
– ident: ref74
  doi: 10.1186/s40854-016-0034-9
– ident: ref143
  doi: 10.14722/ndss.2014.23298
– year: 2013
  ident: ref146
  article-title: Searchable encryption: A technology for supporting secure application
– ident: ref168
  doi: 10.1016/j.procs.2018.03.063
– ident: ref187
  doi: 10.1145/3212998
– ident: ref66
  doi: 10.1007/s12652-018-0881-5
– ident: ref177
  doi: 10.1145/3133956.3134010
– ident: ref224
  doi: 10.1016/0142-0615(83)90023-6
– year: 2015
  ident: ref165
  article-title: Ring signature confidential transactions for monero
– ident: ref92
  doi: 10.1007/978-3-319-46568-5_53
– ident: ref91
  doi: 10.1002/sec.1748
– ident: ref89
  doi: 10.1109/SMARTCOMP.2018.00074
– ident: ref194
  doi: 10.1007/978-3-319-69084-1_19
– ident: ref3
  doi: 10.1109/TSMC.2018.2854904
– ident: ref132
  doi: 10.1109/CCGRID.2017.111
– ident: ref80
  doi: 10.2139/ssrn.2849251
– ident: ref11
  doi: 10.1111/j.1365-2575.2006.00219.x
– ident: ref188
  doi: 10.1007/978-3-319-63688-7_12
– ident: ref166
  doi: 10.1109/COMPSAC.2016.142
– ident: ref75
  doi: 10.1186/s40854-016-0031-z
– year: 2017
  ident: ref153
  article-title: Threshold signatures for blockchain systems
SSID ssj0062889
Score 2.6556048
Snippet Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2)...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2490
SubjectTerms Algorithms
Blockchain
Blockchain security
Business
Computation
Computer architecture
consensus algorithm
Cryptography
data security
Data transmission
Encryption
Information systems
Organizations
process security
Security
smart contract
Smart contracts
Title Blockchain Security: A Survey of Techniques and Research Directions
URI https://ieeexplore.ieee.org/document/9271868
https://www.proquest.com/docview/2698813537
Volume 15
WOSCitedRecordID wos000836642800054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2372-0204
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0062889
  issn: 1939-1374
  databaseCode: RIE
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB7aIqIHH61ifbEHL4Kxm-dkvdVi8SBFaJDewmazQVFa6Qv8985uk6IogqfksBvCzmZmvuzM9wFcYBb7PqrYMVTeTmDIhjLX1LjnSgcCMze0fdxPDzgYxKOReKzB1boXRmtti8_0tbm1Z_n5RC3Mr7KO8NCwu9ehjoirXq3K6xrVXFEdQ3LRSYY9An8eYVLux1Hgfgs7Vkflh_O1EaW_-7932YOdMnNk3ZWp96Gmx03YrArXm7D9hVqwBb1bilKv6pmAPxuWGnU3rMuGi-lSf7BJwZKKvXXG5DhnVQkeK50g7cYDSPp3Se_eKQUTHOUJd-4ESBGPEhwfPamk5FIJTXCNUijXlSrEIuKa01VhkPEik1FQZJEm0FUI5EXkH0JjPBnrI2AqdDH3UNBDMJCUgAtK3MIwVFFGiEqINnSq5UxVSSZuNC3eUgsquEjJAKkxQFoaoA2X6xnvKyKNP8a2zIKvx5Vr3YbTymJp-aXNUi8ScWzEO_D491knsOWZlgVbYnsKjfl0oc9gQy3nL7Ppud1En52-w5A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5qFR8HH61iteoevAjGZjebbNZbLZaKtQgN0ltINhsUpZW-wH_vbJoURRE8JYfdEHY2M_NlZ74P4FzEvuMI5VuGytvihmwopqbGPVGaSxFTN-vjfuqKXs8fDORjCS6XvTBa66z4TF-Z2-wsPxmpmflV1pBMGHb3FVh1OWd00a1V-F2jmyuLg0hbNoJ-C-EfQ1RqO77H6bfAkymp_HC_WUxp7_zvbXZhO88dSXNh7D0o6WEF1ovS9QpsfSEXrELrBuPUq3pG6E_6uUrdNWmS_mw81x9klJKg4G-dkGiYkKIIj-RuEPfjPgTt26DVsXLJBEsxSacWFxjzMMVxBItUFNmRkhoBGyZRlEbKFalnaxuvSvDYTuPI42nsaYRdqRR26jkHUB6OhvoQiHKpSJiQ-BDBI0zBJaZurusqL0ZMJWUNGsVyhiqnEzeqFm9hBitsGaIBQmOAMDdADS6WM94XVBp_jK2aBV-Oy9e6BvXCYmH-rU1C5knfN_Id4uj3WWew0QkeumH3rnd_DJvMNDBkBbd1KE_HM30Ca2o-fZmMT7MN9Qn0v8bX
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain+Security%3A+A+Survey+of+Techniques+and+Research+Directions&rft.jtitle=IEEE+transactions+on+services+computing&rft.au=Leng%2C+Jiewu&rft.au=Zhou%2C+Man&rft.au=Zhao%2C+J.+Leon&rft.au=Huang%2C+Yongfeng&rft.date=2022-07-01&rft.issn=1939-1374&rft.eissn=2372-0204&rft.volume=15&rft.issue=4&rft.spage=2490&rft.epage=2510&rft_id=info:doi/10.1109%2FTSC.2020.3038641&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSC_2020_3038641
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-1374&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-1374&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-1374&client=summon