[1] Jia W., Xie T., andWang B., 2024. A privacy-preserving scheme with multi-level regulation compliance for blockchain.Scientific Reports, 14(1), 438. [2] Korff D.,2023. The indian digital personal data protection act, 2023, viewed from a european perspective.Available at SSRN 4614984. [3] Hassan S.K., andIbrahim M.A., 2024. Enhancement of security and privacy of smart contracts in blockchain. International Journal for Electronic Crime Investigation,8(1), pp. 67-78. [4] Liu Y., Wang C., andMa Y., 2024. DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts.Automated Software Engineering, 31(1), 24. [5] Gustina Zainal M.A., Cosio Borda R.F., Abd Algani Y.M., Yakkala B., Sanjith S., Muda I., Kalaichelvi T., andMahendran M., 2022. A decentralized autonomous personal data management system in banking sector. [6] Zhang Z., Li W., Liu H., andLiu J., 2020. A refined analysis of zcash anonymity.IEEE Access, 8, pp. 31845-31853. [7] Faonio A., Fiore D., andRusso L., 2024. Real-world universal zkSNARKs are non-malleable. InProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 3138-3151. [8] Hossain M.B., Rahayu M., Ali M.A., Huda S., Kodera Y., andNogami Y., 2024. A blockchain-based approach with zk-snarks for secure email applications. International Journal of Networking and Computing,14(2), pp. 225-247. [9] Wu S., Yu Z., Wang D., Zhou Y., Wu L., Wang H., andYuan X., 2023. Defiranger: detecting defi price manipulation attacks. IEEE Transactions on Dependable and Secure Computing,21(4), pp. 4147-4161. [10] Pillai B., Hóu Z., Biswas K., Bui V., andMuthukkumarasamy V., 2022. Blockchain interoperability: performance and security trade-offs. InProceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pp. 1196-1201. [11] Naya-Plasencia, M., and Schrottenloher, A., 2020, May. Optimal merging in quantum k-xor and k-sum algorithms. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cham: Springer International Publishing, pp. 311-340. [12] Goldfeder S., Kalodner H., Reisman D., andNarayanan A., 2017. When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies.Arxiv Preprint Arxiv:1708.04748. [13] Buterin V., Illum J., Nadler M., Schär F., andSoleimani A., 2024. Blockchain privacy and regulatory compliance: towards a practical equilibrium.Blockchain: Research and Applications, 5(1), 100176. [14] Qiu Y., Liu Y., Li X., andChen J., 2020. A novel location privacy-preserving approach based on blockchain.Sensors, 20(12), 3519. [15] Chhabra A., Saha R., andKumar G., 2024. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. Cluster Computing,27(6), pp. 8189-8206. [16] Han M., Li L., Xie Y., Wang J., Duan Z., Li J., andYan M., 2018. Cognitive approach for location privacy protection.IEEE Access, 6, pp. 13466-13477. [17] He M., Zeng G., Zhang J., Zhang L., Chen Y., andYiu S., 2018. A new privacy-preserving searching model on blockchain. InInternational Conference on Information Security and Cryptology, pp. 248-266. [18] Kapsoulis N., Psychas A., Litke A., andVarvarigou T., 2024. Blockchain privacy: fundamental aspects and challenges for the future internet data sharing. IET Blockchain,4(2), pp. 152-168. [19] Wang G., Zhang S., Yu T., andNing Y., 2021. A systematic overview of blockchain research. Journal of Systems Science and Information,9(3), pp. 205-238. [20] Yan G.,2023. Blockchain based data security mechanism for vehicular networks. In2023 6th International Conference on Electronics Technology (ICET), pp. 658-663. |