Security Level Significance in DApps Blockchain-Based Document Authentication

نویسندگان

چکیده

In the development of Industrial revolution 4.0 to improve and modify world's industry by integrating production lines, extraordinary results in field technology information marked its emergence. It can be used enhance document security systems using Blockchain technology. Innovation Authentication has attracted great attention world science capital markets. The persistent problems many available digital currencies various tricks early coin offerings also welcome well-known discussion emerging innovations education. importance this paper follows improvement blockchain framework reveal decentralized applications (dApps) on future value This study uses a descriptive method, which is research method describe that occur present or ongoing, aiming what happened as it should when was conducted. novelty cutting-edge dApps talk about title progress meet positive attributes dApps. Readers will come conclusion dApp know continuous .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image-Based e-Document Authentication

Fingerprint verification is one of the most reliable personal identification methods. With the fast development of the Internet, the usage of e-documents becomes more popular. Nonetheless, the old way of putting fingerprints or stamps on a hardcopy is no longer possible for e-documents. In this paper, a document fingerprinting and de-fingerprinting system is presented. In the document fingerpri...

متن کامل

Blockchain based trust & authentication for decentralized sensor networks

Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows r...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Economic Incentives and Blockchain Security

Much like steam engines and the internet, blockchain has emerged as a disruptive technology and a foundation for tomorrow’s businesses and ecosystem. Blockchains meld technology and economics to provide unprecedented security guarantees. As individuals seek to reduce uncertainties, economic incentives can drive human behavior, and act as the enablers of personal security, either perceived or re...

متن کامل

Speed-Security Tradeo s in Blockchain Protocols

Transaction processing speed is one of the major considerations in cryptocurrencies that are based on proof of work (POW) such as Bitcoin. At an intuitive level it is widely understood that processing speed is at odds with the security aspects of the underlying POW based consensus mechanism of such protocols, nevertheless the tradeo between the two properties is still not well understood. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Aptisi Transactions on Technopreneurship (ATT)

سال: 2022

ISSN: ['2655-8807', '2656-8888']

DOI: https://doi.org/10.34306/att.v4i3.277