Blockchain security

This list was created automatically by the Zotpress bibliography plugin. Add the “security” tag in the Zotero collection and the item will be automatically added here.

Eventually, this page will be curated by an editor. If you are interested in helping, please register and contact the Editor in Chief.


Khan, S., & Khan, R. (2018). Multiple Authorities Attribute-Based Verification Mechanism for Blockchain Mircogrid Transactions. Energies, 11(5), 1–13. https://doi.org/10/gdtd4q
Shanley, A. (2017). Could Blockchain Improve Pharmaceutical Supply Chain Security? PharmTech, 3. http://www.pharmtech.com/could-blockchain-improve-pharmaceutical-supply-chain-security
Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., & Pustišek, M. (2018). Towards decentralized IoT security enhancement: A blockchain approach. Computers & Electrical Engineering, 72, 266–273. https://doi.org/10/gfgtbw
Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where’s the Beef? IEEE Security Privacy, 17(1), 34–42. https://doi.org/10/gfxvzj
Ikeda, K. (2018). Chapter Seven - Security and Privacy of Blockchain and Quantum Computation. In P. Raj & G. C. Deka (Eds.), Advances in Computers (Vol. 111, pp. 199–228). Elsevier. https://doi.org/10.1016/bs.adcom.2018.03.003
Arora, M., Chopra, A. B., & Dixit, V. S. (2020). An Approach to Secure Collaborative Recommender System Using Artificial Intelligence, Deep Learning, and Blockchain. In S. Choudhury, R. Mishra, R. G. Mishra, & A. Kumar (Eds.), Intelligent Communication, Control and Devices (pp. 483–495). Springer Singapore.
Fan, J., Wang, Z., Luo, Y., Bai, J., Li, Y., & Hao, Y. (2019). A new stealth address scheme for blockchain. 67. https://doi.org/10/gf5k7n
Wang, N., Chen, Y., Yang, Y., Fang, Z., & Sun, Y. (2019). Blockchain Private Key Storage Algorithm Based on Image Information Hiding. In X. Sun, Z. Pan, & E. Bertino (Eds.), Artificial Intelligence and Security (pp. 542–552). Springer International Publishing.
Liang, H., Wu, J., Mumtaz, S., Li, J., Lin, X., & Wen, M. (2019). MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X. IEEE Communications Magazine, 57(10), 77–83. https://doi.org/10/ggcz84
Cui, P., Guin, U., Skjellum, A., & Umphress, D. (2019). Blockchain in IoT: Current Trends, Challenges, and Future Roadmap. Journal of Hardware and Systems Security. https://doi.org/10/ggcz8t
Ho, S.-B., Ahmad, N. A., Chai, I., Tan, C.-H., & Chean, S.-L. (2020). Modeling Reliable Intelligent Blockchain with Architectural Pattern. In F. Saeed, F. Mohammed, & N. Gazem (Eds.), Emerging Trends in Intelligent Computing and Informatics (pp. 1122–1131). Springer International Publishing. https://doi.org/10/ggcz8n
Pillai, A., Saraswat, V., & V. R., A. (2019). Smart Wallets on Blockchain—Attacks and Their Costs. In G. Wang, A. El Saddik, X. Lai, G. Martinez Perez, & K.-K. R. Choo (Eds.), Smart City and Informatization (pp. 649–660). Springer. https://doi.org/10/ggcz8f
Su, L., Cheng, Y., Meng, H., Thing, V., Wang, Z., Kong, L., & Cheng, L. (2019). Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation. In M. Qiu (Ed.), Smart Blockchain (pp. 109–119). Springer International Publishing. https://doi.org/10/ggcz8c
Eltayieb, N., Sun, L., Wang, K., & Li, F. (2019). A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. In B. Shen, B. Wang, J. Han, & Y. Yu (Eds.), Frontiers in Cyber Security (pp. 293–307). Springer. https://doi.org/10/ggcz7j
Mbarek, B., Jabeur, N., Pitner, T., & Yasar, A.-U.-H. (2019). MBS: Multilevel Blockchain System for IoT. Personal and Ubiquitous Computing. https://doi.org/10.1007/s00779-019-01339-5
Bhushan, B., Khamparia, A., Sagayam, K. M., Sharma, S. K., Ahad, M. A., & Debnath, N. C. (2020). Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustainable Cities and Society, 61, 102360. https://doi.org/https://doi.org/10.1016/j.scs.2020.102360
Lu, N., Zhang, Y., Shi, W., Kumari, S., & Choo, K.-K. R. (2020). A secure and scalable data integrity auditing scheme based on hyperledger fabric. Computers & Security, 92, 101741. https://doi.org/10/gg35gs
Gupta, R., Tanwar, S., Kumar, N., & Tyagi, S. (2020). Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review. Computers and Electrical Engineering, 86, 106717. https://doi.org/10/gg35gj
Singh, S., Sharma, P. K., Yoon, B., Shojafar, M., Cho, G. H., & Ra, I.-H. (2020). Convergence of Blockchain and Artificial Intelligence in IoT Network for the Sustainable Smart City. Sustainable Cities and Society, 102364. https://doi.org/10/gg35gh
Cai, Z., Du, C., Gan, Y., Zhang, J., & Huang, and W. (2018). Research and Development of Blockchain Security. International Journal of Performability Engineering, 14(9), 2040. http://www.ijpe-online.com/research-and-development-of-blockchain-security.html
Kalra, S., & Goel, S. (2019). Analyzing Safety of Smart Contracts. Journal of Fintech, Blockchain, and Smart Contracts, 2(1), 44–45. https://jfbsc.org/index.php/jfbsc/article/view/54
Guerraoui, R., Pavlovic, M., & Seredinschi, D.-A. (2018). Blockchain Protocols: The Adversary is in the Details. Symposium on Foundations and Applications of Blockchain, 24.
Yang, M., Zhu, T., Liang, K., Zhou, W., & Deng, R. H. (2018). A blockchain-based location privacy-preserving crowdsensing system. Future Generation Computer Systems. https://doi.org/10/ggjh6k
Lele, A. (2019). Blockchain. In A. Lele (Ed.), Disruptive Technologies for the Militaries and Security (pp. 197–202). Springer Singapore. https://doi.org/10.1007/978-981-13-3384-2_12
McCallig, J., Robb, A., & Rohde, F. (2019). Establishing the Representational Faithfulness of Financial Accounting Information Using Multiparty Security, Network Analysis and a Blockchain. International Journal of Accounting Information Systems. https://doi.org/10/gfxvxp
Moubarak, J., Filiol, E., & Chamoun, M. (2018). On blockchain security and relevant attacks. 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1–6. https://doi.org/10/gfv9v3
Shafi, Q., & Basit, A. (2019). DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 624–628. https://doi.org/10/gfxmq3
Shyshkova, N. (2018). Prospects for the Implementation of Blockchain in Accounting. Accounting and Finance, 2, 61–68. https://econpapers.repec.org/article/iafjournl/y_3a2018_3ai_3a2_3ap_3a61-68.htm
Lee, H., Shin, M., Kim, K. S., Kang, Y., & Kim, J. (2018). Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain. 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 1–2. https://doi.org/10/gfxmb4
Rahmadika, S., Ramdania, D. R., & Harika, M. (2018). Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology. Jurnal Online Informatika, 3(1), 44–47. https://doi.org/10/gfxmb5
Di Francesco Maesa, D., Mori, P., & Ricci, L. (2019). A Blockchain Based Approach for the Definition of Auditable Access Control Systems. Computers & Security, 84, 93–119. https://doi.org/10/gfxmbn
Lee, H., & Ma, M. (2019). Blockchain-based mobility management for 5G. Future Generation Computer Systems. https://doi.org/10/gf78kn
Zhong, P., Zhong, Q., Mi, H., Zhang, S., & Xiang, Y. (2019). Privacy-Protected Blockchain System. 2019 20th IEEE International Conference on Mobile Data Management (MDM), 457–461. https://doi.org/10/gf78kf
Lu, Y. (2019). The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration. https://doi.org/10/ggjjww
Park, K., Kim, D. K., & Youm, H. Y. (2019). Security Enhancements for Distributed Ledger Technology Systems Based on Open Source. Journal of the Korea Institute of Information Security and Cryptology, 29(4), 919–943. https://doi.org/10/gf9td9
Singh, S. K., Salim, M. M., Cho, M., Cha, J., Pan, Y., & Park, J. H. (2019). Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks. Symmetry, 11(7), 941. https://doi.org/10/gf5k7g
Li, J., Wu, J., Chen, L., & Li, J. (2018). Deduplication with Blockchain for Secure Cloud Storage. In Z. Xu, X. Gao, Q. Miao, Y. Zhang, & J. Bu (Eds.), Big Data (Vol. 945, pp. 558–570). Springer. https://doi.org/10/ggzsrc
Wan, Z., Lo, D., Xia, X., & Cai, L. (2017, May 20). Bug Characteristics In Blockchain Systems: A Large-Scale Empirical Study. IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). https://doi.org/10/ggzsqf
Neudecker, T., Andelfinger, P., & Hartenstein, H. (2015). A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network. 1327–1332. https://doi.org/10/ggzsqc
Vasek, M., Bonneau, J., Castellucci, R., Keith, C., & Moore, T. (2016). The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. International Conference on Financial Cryptography and Data Security, 609–618.
Koshy, P., Koshy, D., & McDaniel, P. (2014). An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. International Conference on Financial Cryptography and Data Security, 469–485. https://doi.org/10/ggpqfq
Gao, Y., Chen, X., Chen, Y., Sun, Y., Niu, X., & Yang, Y. (2018). A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain. IEEE Access, 6, 27205–27213. https://doi.org/10/ggw2sb
Kim, Y., Raman, R. K., Kim, Y., Varshney, L. R., & Shanbhag, N. R. (2018). Efficient Local Secret Sharing for Distributed Blockchain Systems. IEEE Communications Letters, 1–1. https://doi.org/10/ggzspq
Madsen, M. F., Gaub, M., Høgnason, T., Kirkbro, M. E., Slaats, T., & Debois, S. (2018). Collaboration among Adversaries: Distributed Workflow Execution on a Blockchain. 2018 Symposium on Foundations and Applications of Blockchain.
Feng, X., Ma, J., Feng, T., Miao, Y., & Liu, X. (2018). Consortium Blockchain-based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network. IEEE Access, 1–1. https://doi.org/10/ggzspj
Tang, F., Ma, S., Xiang, Y., & Lin, C. (2019). An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access, 1–1. https://doi.org/10/gfxmbs
Guo, Z. (2019). Research on File Security Verification Method Based on Blockchain Technology. Remote Sensing Science, 7(0). http://www.ivypub.org/RSS/paperInfo/52246.shtml
Liang, X., Du, Y., Wang, X., & Zeng, Y. (2019). Design of A Double-blockchain Structured Carbon Emission Trading Scheme with Reputation. 2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC), 464–467. https://doi.org/10/gf78pq
Conti, M., Hassan, M., & Lal, C. (2019). BlockAuth: BlockChain based distributed producer Authentication in ICN. Computer Networks, 106888. https://doi.org/10/gf78ns
Jin, X., Bai, C., Zhang, Z., Zhao, S., Wang, H., Yan, Z., Zhang, L., & Chen, S. (2019). Blockchain-enabled Transactive Method in Distributed Systems Considering Security Constraints. 2019 IEEE Congress on Evolutionary Computation (CEC), 1203–1207. https://doi.org/10/gf78kk