[1] Leporati A., andRovida L., 2024. Looking for stability in proof-of-stake based consensus mechanisms.Blockchain: Research and Applications, 5(4), 100222. [2] Makhdoom I., Abolhasan M., Lipman J., Piccardi M., andFranklin D., 2024. PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems.Blockchain: Research and Applications, 5(4), 100220. [3] Rajput S., Singh A., Khurana S., Bansal T., andShreshtha S., 2019. Blockchain technology and cryptocurrenices. In2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 909-912. [4] Wylde V., Rawindaran N., Lawrence J., Balasubramanian R., Prakash E., Jayal A., Khan I., Hewage C., andPlatts J., 2022. Cybersecurity, data privacy and blockchain: A review.SN Computer Science, 3(2), 127. [5] Stach C., Gritti C., Przytarski D., andMitschang B., 2022. Assessment and treatment of privacy issues in blockchain systems. ACM SIGAPP Applied Computing Review,22(3), pp. 5-24. [6] Zhang Q., Lv H., Ma J., Li J., andZhang J., 2021. Overview of blockchain data privacy protection. InProceedings of the 2021 3rd Blockchain and Internet of Things Conference, pp. 53-58. [7] Douceur J.R.,2002. The sybil attack. InInternational Workshop on Peer-to-Peer Systems, pp. 251-260. [8] Heilman E., Kendler A., Zohar A., andGoldberg S., 2015. Eclipse attacks on {bitcoin’s}{peer-to-peer} network. In24th USENIX Security Symposium (USENIX Security 15), pp. 129-144. [9] Ben-Sasson E., Chiesa A., Genkin D., Tromer E., andVirza M., 2013. SNARKs for C: verifying program executions succinctly and in zero knowledge. InAnnual Cryptology Conference, pp. 90-108. [10] Ben-Sasson E., Bentov I., Horesh Y., andRiabzev M., 2018. Scalable, transparent, and post-quantum secure computational integrity.Cryptology Eprint Archive. [11] Bünz B., Bootle J., Boneh D., Poelstra A., Wuille P., andMaxwell G., 2018. Bulletproofs: short proofs for confidential transactions and more. In2018 IEEE Symposium on Security and Privacy (SP), pp. 315-334. [12] Al-Bassam M., Sonnino A., Bano S., Hrycyszyn D., andDanezis G., 2017. Chainspace: A sharded smart contracts platform.Arxiv Preprint Arxiv:1708.03778. [13] Fadi O., Karim Z., andMohammed B., 2022. A survey on blockchain and artificial intelligence technologies for enhancing security and privacy in smart environments.IEEE Access, 10, pp. 93168-93186. [14] Sakamoto T.,2024. Impact of blockchain technology on supply chain transparency in japan. American Journal of Supply Chain Management,9(3), pp. 45-57. [15] Hashim H., Alzighaibi A.R., Elessawy A.F., Gad I., Abdul-Kader H., andElsaid A., 2023. Securing financial transactions with a robust algorithm: preventing double-spending attacks.Computers, 12(9), 171. [16] Dayong Z., Wahab N.H.A., Kadir K.A., Aldhaqm A., Nasir H.M., andWong K.Y., 2023. Research on blockchain: privacy protection of cryptography blockchain-based applications. In2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp. 1-6. [17] Luong D.A., andPark J.H., 2023. Privacy-preserving identity management system on blockchain using zk-SNARK.IEEE Access, 11, pp. 1840-1853. |