Blockchain security

This list was created automatically by the Zotpress bibliography plugin. Add the “security” tag in the Zotero collection and the item will be automatically added here.

Eventually, this page will be curated by an editor. If you are interested in helping, please register and contact the Editor in Chief.

Liang, X., Du, Y., Wang, X., & Zeng, Y. (2019). Design of A Double-blockchain Structured Carbon Emission Trading Scheme with Reputation. In 2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC) (pp. 464–467).
Conti, M., Hassan, M., & Lal, C. (2019). BlockAuth: BlockChain based distributed producer Authentication in ICN. Computer Networks, 106888.
Arora, M., Chopra, A. B., & Dixit, V. S. (2020). An Approach to Secure Collaborative Recommender System Using Artificial Intelligence, Deep Learning, and Blockchain. In S. Choudhury, R. Mishra, R. G. Mishra, & A. Kumar (Eds.), Intelligent Communication, Control and Devices (pp. 483–495). Springer Singapore.
Lee, H., & Ma, M. (2019). Blockchain-based mobility management for 5G. Future Generation Computer Systems.
Jin, X., Bai, C., Zhang, Z., Zhao, S., Wang, H., Yan, Z., … Chen, S. (2019). Blockchain-enabled Transactive Method in Distributed Systems Considering Security Constraints. In 2019 IEEE Congress on Evolutionary Computation (CEC) (pp. 1203–1207).
Zhong, P., Zhong, Q., Mi, H., Zhang, S., & Xiang, Y. (2019). Privacy-Protected Blockchain System. In 2019 20th IEEE International Conference on Mobile Data Management (MDM) (pp. 457–461).
Davi, L., Hatebur, D., Heisel, M., & Wirtz, R. (2019). Combining Safety and Security in Autonomous Cars Using Blockchain Technologies. In A. Romanovsky, E. Troubitsyna, I. Gashi, E. Schoitsch, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security (pp. 223–234). Springer International Publishing.
Lu, Y. (2019). The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration.
Braga, J., Silva, J. N., Endo, P. T., Ribas, J., & Omar, N. (2018). Blockchain to Improve Security, Knowledge and Collaboration Inter-Agent Communication over Restrict Domains of the Internet Infrastructure. Retrieved from
Liang, H., Wu, J., Mumtaz, S., Li, J., Lin, X., & Wen, M. (2019). MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X. IEEE Communications Magazine, 57(10), 77–83.
Cui, P., Guin, U., Skjellum, A., & Umphress, D. (2019). Blockchain in IoT: Current Trends, Challenges, and Future Roadmap. Journal of Hardware and Systems Security.
Ho, S.-B., Ahmad, N. A., Chai, I., Tan, C.-H., & Chean, S.-L. (2020). Modeling Reliable Intelligent Blockchain with Architectural Pattern. In F. Saeed, F. Mohammed, & N. Gazem (Eds.), Emerging Trends in Intelligent Computing and Informatics (pp. 1122–1131). Cham: Springer International Publishing.
Sengupta, J., Ruj, S., & Das Bit, S. (2020). A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.
Pillai, A., Saraswat, V., & V. R., A. (2019). Smart Wallets on Blockchain—Attacks and Their Costs. In G. Wang, A. El Saddik, X. Lai, G. Martinez Perez, & K.-K. R. Choo (Eds.), Smart City and Informatization (pp. 649–660). Singapore: Springer.
Su, L., Cheng, Y., Meng, H., Thing, V., Wang, Z., Kong, L., & Cheng, L. (2019). Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation. In M. Qiu (Ed.), Smart Blockchain (pp. 109–119). Cham: Springer International Publishing.
Gao, S., Li, Z., Peng, Z., & Xiao, B. (2019). Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 833–850). New York, NY, USA: ACM.
Bian, W., Meng, W., & Wang, Y. (2019). Poster: Detecting WebAssembly-based Cryptocurrency Mining. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2685–2687). New York, NY, USA: ACM.
Bagaria, V., Kannan, S., Tse, D., Fanti, G., & Viswanath, P. (2019). Prism: Deconstructing the Blockchain to Approach Physical Limits. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 585–602). New York, NY, USA: ACM.
Eltayieb, N., Sun, L., Wang, K., & Li, F. (2019). A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. In B. Shen, B. Wang, J. Han, & Y. Yu (Eds.), Frontiers in Cyber Security (pp. 293–307). Singapore: Springer.
Mbarek, B., Jabeur, N., Pitner, T., & Yasar, A.-U.-H. (2019). MBS: Multilevel Blockchain System for IoT. Personal and Ubiquitous Computing.
Kim, S.-K. (Steve). (2019). Apply Blockchain to Overcome Wi-Fi Vulnerabilities. Journal of Multimedia Information System, 6(3), 139–146.
Park, K., Kim, D. K., & Youm, H. Y. (2019). Security Enhancements for Distributed Ledger Technology Systems Based on Open Source. Journal of the Korea Institute of Information Security and Cryptology, 29(4), 919–943.
Kalra, S., & Goel, S. (2019). Analyzing Safety of Smart Contracts. Journal of Fintech, Blockchain, and Smart Contracts, 2(1), 44–45. Retrieved from
Khan, S., & Khan, R. (2018). Multiple Authorities Attribute-Based Verification Mechanism for Blockchain Mircogrid Transactions. Energies, 11(5), 1–13.
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), 58.
Feng, S., Wang, W., Xiong, Z., Niyato, D., Wang, P., & Wang, S. S. (2018). On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach. Retrieved from
Ikeda, K. (2018). Chapter Seven - Security and Privacy of Blockchain and Quantum Computation. In P. Raj & G. C. Deka (Eds.), Advances in Computers (Vol. 111, pp. 199–228). Elsevier.
Singh, S. K., Salim, M. M., Cho, M., Cha, J., Pan, Y., & Park, J. H. (2019). Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks. Symmetry, 11(7), 941.
Wang, N., Chen, Y., Yang, Y., Fang, Z., & Sun, Y. (2019). Blockchain Private Key Storage Algorithm Based on Image Information Hiding. In X. Sun, Z. Pan, & E. Bertino (Eds.), Artificial Intelligence and Security (pp. 542–552). Springer International Publishing.
Fan, J., Wang, Z., Luo, Y., Bai, J., Li, Y., & Hao, Y. (2019). A new stealth address scheme for blockchain (p. 67). Presented at the Proceedings of the ACM Turing Celebration Conference - China, ACM.
Danielle Batista, & Victoria Lemieux. (2019). Bounded and Shielded: Assessing Security Aspects and Trustworthiness of Smart Contracts. Presented at the Proceedings of the Annual Conference of CAIS. Retrieved from
Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where’s the Beef? IEEE Security Privacy, 17(1), 34–42.
Guo, Z. (2019). Research on File Security Verification Method Based on Blockchain Technology. Remote Sensing Science, 7(0). Retrieved from
McCallig, J., Robb, A., & Rohde, F. (2019). Establishing the Representational Faithfulness of Financial Accounting Information Using Multiparty Security, Network Analysis and a Blockchain. International Journal of Accounting Information Systems.
Shafi, Q., & Basit, A. (2019). DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 624–628).
Shyshkova, N. (2018). Prospects for the Implementation of Blockchain in Accounting. Accounting and Finance, (2), 61–68. Retrieved from
Rahmadika, S., Ramdania, D. R., & Harika, M. (2018). Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology. Jurnal Online Informatika, 3(1), 44–47.
Lee, H., Shin, M., Kim, K. S., Kang, Y., & Kim, J. (2018). Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1–2).
Di Francesco Maesa, D., Mori, P., & Ricci, L. (2019). A Blockchain Based Approach for the Definition of Auditable Access Control Systems. Computers & Security, 84, 93–119.
Tang, F., Ma, S., Xiang, Y., & Lin, C. (2019). An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access, 1–1.
Wang, M., Duan, M., & Zhu, J. (2018). Research on the Security Criteria of Hash Functions in the Blockchain. In Proceedings of the 2Nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts (pp. 47–55). New York, NY, USA: ACM.
Fan, X. (2018). Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. In International Conference on Blockchain (pp. 127–138). Springer.
Moubarak, J., Filiol, E., & Chamoun, M. (2018). On blockchain security and relevant attacks. In 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 1–6).
Li, J., Wu, J., Chen, L., & Li, J. (2018). Deduplication with Blockchain for Secure Cloud Storage. In Z. Xu, X. Gao, Q. Miao, Y. Zhang, & J. Bu (Eds.), Big Data (Vol. 945, pp. 558–570). Singapore: Springer.
Lele, A. (2019). Blockchain. In A. Lele (Ed.), Disruptive Technologies for the Militaries and Security (pp. 197–202). Singapore: Springer Singapore.
Koshy, P., Koshy, D., & McDaniel, P. (2014). An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In International Conference on Financial Cryptography and Data Security (pp. 469–485). Christ Church, Barbados: Springer.
Neudecker, T., Andelfinger, P., & Hartenstein, H. (2015). A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network (pp. 1327–1332). Presented at the Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, Ottawa, ON: IEEE.
Wan, Z., Lo, D., Xia, X., & Cai, L. (2017). Bug Characteristics In Blockchain Systems: A Large-Scale Empirical Study. In IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). Buenos Aires, Argentina: IEEE.
Vasek, M., Bonneau, J., Castellucci, R., Keith, C., & Moore, T. (2016). The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. In International Conference on Financial Cryptography and Data Security (pp. 609–618). Springer.
Kaiser, B., Jurado, M., & Ledger, A. (2018). The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. Retrieved from