Blockchain security

This list was created automatically by the Zotpress bibliography plugin. Add the “security” tag in the Zotero collection and the item will be automatically added here.

Eventually, this page will be curated by an editor. If you are interested in helping, please register and contact the Editor in Chief.


Singh, S. K., Salim, M. M., Cho, M., Cha, J., Pan, Y., & Park, J. H. (2019). Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks. Symmetry, 11(7), 941. https://doi.org/10.3390/sym11070941
Wang, N., Chen, Y., Yang, Y., Fang, Z., & Sun, Y. (2019). Blockchain Private Key Storage Algorithm Based on Image Information Hiding. In X. Sun, Z. Pan, & E. Bertino (Eds.), Artificial Intelligence and Security (pp. 542–552). Springer International Publishing.
Fan, J., Wang, Z., Luo, Y., Bai, J., Li, Y., & Hao, Y. (2019). A new stealth address scheme for blockchain (p. 67). Presented at the Proceedings of the ACM Turing Celebration Conference - China, ACM. https://doi.org/10.1145/3321408.3321573
Danielle Batista, & Victoria Lemieux. (2019). Bounded and Shielded: Assessing Security Aspects and Trustworthiness of Smart Contracts. Presented at the Proceedings of the Annual Conference of CAIS. Retrieved from https://journals.library.ualberta.ca/ojs.cais-acsi.ca/index.php/cais-asci/article/view/1063
Lu, Y. (2019). The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration. https://doi.org/10.1016/j.jii.2019.04.002
Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where’s the Beef? IEEE Security Privacy, 17(1), 34–42. https://doi.org/10.1109/MSEC.2018.2875877
Guo, Z. (2019). Research on File Security Verification Method Based on Blockchain Technology. Remote Sensing Science, 7(0). Retrieved from http://www.ivypub.org/RSS/paperInfo/52246.shtml
McCallig, J., Robb, A., & Rohde, F. (2019). Establishing the Representational Faithfulness of Financial Accounting Information Using Multiparty Security, Network Analysis and a Blockchain. International Journal of Accounting Information Systems. https://doi.org/10/gfxvxp
Shafi, Q., & Basit, A. (2019). DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 624–628). https://doi.org/10/gfxmq3
Shyshkova, N. (2018). Prospects for the Implementation of Blockchain in Accounting. Accounting and Finance, (2), 61–68. Retrieved from https://econpapers.repec.org/article/iafjournl/y_3a2018_3ai_3a2_3ap_3a61-68.htm
Rahmadika, S., Ramdania, D. R., & Harika, M. (2018). Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology. Jurnal Online Informatika, 3(1), 44–47. https://doi.org/10/gfxmb5
Lee, H., Shin, M., Kim, K. S., Kang, Y., & Kim, J. (2018). Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1–2). https://doi.org/10/gfxmb4
Di Francesco Maesa, D., Mori, P., & Ricci, L. (2019). A Blockchain Based Approach for the Definition of Auditable Access Control Systems. Computers & Security, 84, 93–119. https://doi.org/10/gfxmbn
Tang, F., Ma, S., Xiang, Y., & Lin, C. (2019). An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access, 1–1. https://doi.org/10.1109/ACCESS.2019.2904300
Wang, M., Duan, M., & Zhu, J. (2018). Research on the Security Criteria of Hash Functions in the Blockchain. In Proceedings of the 2Nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts (pp. 47–55). New York, NY, USA: ACM. https://doi.org/10/gfv9xw
Fan, X. (2018). Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. In International Conference on Blockchain (pp. 127–138). Springer. https://doi.org/10/gfv9wd
Moubarak, J., Filiol, E., & Chamoun, M. (2018). On blockchain security and relevant attacks. In 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 1–6). https://doi.org/10/gfv9v3
Li, J., Wu, J., Chen, L., & Li, J. (2018). Deduplication with Blockchain for Secure Cloud Storage. In Z. Xu, X. Gao, Q. Miao, Y. Zhang, & J. Bu (Eds.), Big Data (Vol. 945, pp. 558–570). Singapore: Springer. https://doi.org/10.1007/978-981-13-2922-7_36
Lele, A. (2019). Blockchain. In A. Lele (Ed.), Disruptive Technologies for the Militaries and Security (pp. 197–202). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-13-3384-2_12
Koshy, P., Koshy, D., & McDaniel, P. (2014). An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In International Conference on Financial Cryptography and Data Security (pp. 469–485). Christ Church, Barbados: Springer. https://doi.org/10.1007/978-3-662-45472-5
Neudecker, T., Andelfinger, P., & Hartenstein, H. (2015). A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network (pp. 1327–1332). Presented at the Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, Ottawa, ON: IEEE. https://doi.org/10.1109/INM.2015.7140490
Wan, Z., Lo, D., Xia, X., & Cai, L. (2017). Bug Characteristics In Blockchain Systems: A Large-Scale Empirical Study. In IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). Buenos Aires, Argentina: IEEE. https://doi.org/10.1109/MSR.2017.59
Vasek, M., Bonneau, J., Castellucci, R., Keith, C., & Moore, T. (2016). The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. In International Conference on Financial Cryptography and Data Security (pp. 609–618). Springer.
Kaiser, B., Jurado, M., & Ledger, A. (2018). The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. Retrieved from http://arxiv.org/abs/1810.02466
Feng, S., Wang, W., Xiong, Z., Niyato, D., Wang, P., & Wang, S. S. (2018). On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach. ArXiv:1804.10412 [Cs]. Retrieved from http://arxiv.org/abs/1804.10412
Shanley, A. (2017). Could Blockchain Improve Pharmaceutical Supply Chain Security? PharmTech, 3. Retrieved from http://www.pharmtech.com/could-blockchain-improve-pharmaceutical-supply-chain-security
Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., & Pustišek, M. (2018). Towards decentralized IoT security enhancement: A blockchain approach. Computers & Electrical Engineering, 72, 266–273. https://doi.org/10.1016/j.compeleceng.2018.08.021
Feng, X., Ma, J., Feng, T., Miao, Y., & Liu, X. (2018). Consortium Blockchain-based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network. IEEE Access, 1–1. https://doi.org/10.1109/ACCESS.2018.2869856
Uchibeke, U. U., Kassani, S. H., Schneider, K. A., & Deters, R. (2018). Blockchain access control Ecosystem for Big Data security.
Cai, Z., Du, C., Gan, Y., Zhang, J., & Huang, and W. (2018). Research and Development of Blockchain Security. International Journal of Performability Engineering, 14(9), 2040. Retrieved from http://www.ijpe-online.com/research-and-development-of-blockchain-security.html
Madsen, M. F., Gaub, M., Høgnason, T., Kirkbro, M. E., Slaats, T., & Debois, S. (2018). Collaboration among Adversaries: Distributed Workflow Execution on a Blockchain. In 2018 Symposium on Foundations and Applications of Blockchain.
Guerraoui, R., Pavlovic, M., & Seredinschi, D.-A. (2018). Blockchain Protocols: The Adversary is in the Details. In Symposium on Foundations and Applications of Blockchain (p. 24).
Das, S., Kolluri, A., Saxena, P., & Yu, H. (2018). (Invited Paper) on the Security of Blockchain Consensus Protocols. In V. Ganapathy, T. Jaeger, & R. K. Shyamasundar (Eds.), Information Systems Security (pp. 465–480). Springer International Publishing.
Yang, M., Zhu, T., Liang, K., Zhou, W., & Deng, R. H. (2018). A blockchain-based location privacy-preserving crowdsensing system. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.11.046
Kim, Y., Raman, R. K., Kim, Y., Varshney, L. R., & Shanbhag, N. R. (2018). Efficient Local Secret Sharing for Distributed Blockchain Systems. IEEE Communications Letters, 1–1. https://doi.org/10.1109/LCOMM.2018.2886016
Wang, W. (2018). A Vision for Trust, Security and Privacy of Blockchain. In M. Qiu (Ed.), Smart Blockchain (pp. 93–98). Springer International Publishing.
Zhao, H., Liu, Y., Wang, Y., Wang, X., & Li, J. (2018). A Blockchain-Based Data Hiding Method for Data Protection in Digital Video. In M. Qiu (Ed.), Smart Blockchain (pp. 99–110). Springer International Publishing.
Zhu, L., Zheng, B., Shen, M., Yu, S., Gao, F., Li, H., … Gai, K. (2018). Research on the Security of Blockchain Data: A Survey. Retrieved from http://arxiv.org/abs/1812.02009
Sattath, O. (2018). On the insecurity of quantum Bitcoin mining. Retrieved from http://arxiv.org/abs/1804.08118
Guri, M. (2018). BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. Retrieved from http://arxiv.org/abs/1804.08714
Gao, Y., Chen, X., Chen, Y., Sun, Y., Niu, X., & Yang, Y. (2018). A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain. IEEE Access, 6, 27205–27213. https://doi.org/10.1109/ACCESS.2018.2827203
Ahmed, M., & Kostiainen, K. (2018). Identity Aging: Efficient Blockchain Consensus. Retrieved from http://arxiv.org/abs/1804.07391
Lee, D. (Ed.). (2015). Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data. Amsterdam: Elsevier/ AP.