Collection of “Science and Engineering” Research

Registered users can download full texts.

Wang, Z., Yu, H., Zhang, Z., Piao, J., & Liu, J. (2020). ECDSA weak randomness in Bitcoin. Future Generation Computer Systems, 102, 507–513.
Wang, E. K., Liang, Z., Chen, C.-M., Kumari, S., & Khan, M. K. (2020). PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Generation Computer Systems, 102, 140–151.
Ojeda, C. A. M., Cvejoski, K., Sifa, R., Schuecker, J., & Bauckhage, C. (2020). Patterns and Outliers in Temporal Point Processes. In Y. Bi, R. Bhatia, & S. Kapoor (Eds.), Intelligent Systems and Applications (pp. 507–526). Springer International Publishing.
Wright, C. S. (2020). Agent-Based Turing-Complete Transactions Integrating Feedback Within a Blockchain System. In Y. Bi, R. Bhatia, & S. Kapoor (Eds.), Intelligent Systems and Applications (pp. 253–265). Springer International Publishing.
Wang, H., Wang, X. A., Wang, W., & Xiao, S. (2020). A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing. In L. Barolli, H. Nishino, & H. Miwa (Eds.), Advances in Intelligent Networking and Collaborative Systems (pp. 415–421). Springer International Publishing.
Khieu, B. T., & Moh, M. (2020). Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications. Security, Privacy, and Forensics Issues in Big Data, 125–140.
Fuji, R., Usuzaki, S., Aburada, K., Yamaba, H., Katayama, T., Park, M., … Okazaki, N. (2020). Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. In L. Barolli, H. Nishino, T. Enokido, & M. Takizawa (Eds.), Advances in Networked-based Information Systems (pp. 305–316). Springer International Publishing.
Goyal, P. S., Kakkar, A., Vinod, G., & Joseph, G. (2020). Crypto-Ransomware Detection Using Behavioural Analysis. In P. V. Varde, R. V. Prakash, & G. Vinod (Eds.), Reliability, Safety and Hazard Assessment for Risk-Based Technologies (pp. 239–251). Springer Singapore.
Veselý, V., & Žádník, M. (2019). How to detect cryptocurrency miners? By traffic forensics! Digital Investigation, 31, 100884.
Si, H., Sun, C., Li, Y., Qiao, H., & Shi, L. (2019). IoT information sharing security mechanism based on blockchain technology. Future Generation Computer Systems, 101, 1028–1040.
Putz, B., Menges, F., & Pernul, G. (2019). A secure and auditable logging infrastructure based on a permissioned blockchain. Computers & Security, 87, 101602.
Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.
Bugday, A., Ozsoy, A., Öztaner, S. M., & Sever, H. (2019). Creating consensus group using online learning based reputation in blockchain networks. Pervasive and Mobile Computing, 59, 101056.
Chen, H., & Wang, Y. (2019). SSChain: A full sharding protocol for public blockchain without data migration overhead. Pervasive and Mobile Computing, 59, 101055.
Wong, L.-W., Leong, L.-Y., Hew, J.-J., Tan, G. W.-H., & Ooi, K.-B. (2019). Time to seize the digital evolution: Adoption of blockchain in operations and supply chain management among Malaysian SMEs. International Journal of Information Management.
Tsuchida, T., Takita, M., Shiraishi, Y., Mohri, M., Takano, Y., & Morii, M. (2019). Authentication Scheme Using Pre-Registered Information on Blockchain. IEICE Transactions on Information and Systems, E102.D(9), 1676–1678.
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), 58.
Conti, M., Hassan, M., & Lal, C. (2019). BlockAuth: BlockChain based distributed producer Authentication in ICN. Computer Networks, 106888.
Paul, R., Ghosh, N., Sau, S., Chakrabarti, A., & Mahapatra, P. (2019). IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain. Retrieved from
Tang, Q. (2019). Towards Blockchain-enabled Searchable Encryption. Retrieved from
Aniello, L., Halak, B., Chai, P., Dhall, R., Mihalea, M., & Wilczynski, A. (2019). Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF. Retrieved from
Aspembitova, A., Feng, L., Melnikov, V., & Chew, L. Y. (2019). Fitness preferential attachment as a driving mechanism in bitcoin transaction network. PLOS ONE, 14(8), e0219346.
Pal, O., Alam, B., Thakur, V., & Singh, S. (2019). Key management for blockchain technology. ICT Express.
Belikovetsky, S., Leiba, O., Shabtai, A., & Elovici, Y. (2019). 3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. Retrieved from
Abay, N. C., Akcora, C. G., Gel, Y. R., Islambekov, U. D., Kantarcioglu, M., Tian, Y., & Thuraisingham, B. (2019). ChainNet: Learning on Blockchain Graphs with Topological Features. Retrieved from
Eckert, J., López, D., Azevedo, C. L., & Farooq, B. (2019). A blockchain-based user-centric emission monitoring and trading system for multi-modal mobility. Retrieved from
Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2019). Secure Computation Offloading in Blockchain based IoT Networks with Deep Reinforcement Learning. Retrieved from
Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2019). Privacy-Preserved Task Offloading in Mobile Blockchain with Deep Reinforcement Learning. Retrieved from
Maesa, D. D. F., Marino, A., & Ricci, L. (2019). The bow tie structure of the Bitcoin users graph. Applied Network Science, 4(1), 56.
Winnicka, A., & Kęsik, K. (2019). Idea of Using Blockchain Technique for Choosingthe Best Configuration of Weights in Neural Networks. Algorithms, 12(8), 163.
Krishnamurthy, R., Rathee, G., & Jaglan, N. (2019). An enhanced security mechanism through blockchain for E-polling/counting process using IoT devices. Wireless Networks.
Zhu, X. (2019). Research on blockchain consensus mechanism and implementation. IOP Conference Series: Materials Science and Engineering, 569, 042058.
Lopez, D., & Farooq, B. (2019). Privacy-Aware Distributed Mobility Choice Modelling over Blockchain. Retrieved from
Lee, H., & Ma, M. (2019). Blockchain-based mobility management for 5G. Future Generation Computer Systems.
Meng, W., Li, W., Yang, L. T., & Li, P. (2019). Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. International Journal of Information Security.
Havelange, N., Dumontier, M., Wouters, B., Linde, J., Townend, D., Riedl, A., & Urovi, V. (2019). Luce: A Blockchain Solution for Monitoring Data License Accountability and Compliance. Retrieved from
Shibata, N. (2019). Blockchain Consensus Formation while Solving Optimization Problems. Retrieved from
Yang, G., Li, C., & Marstein, K. E. (2019). A blockchain‐based architecture for securing electronic health record systems. Concurrency and Computation: Practice and Experience.
Betarte, G., Cristiá, M., Luna, C., Silveira, A., & Zanarini, D. (2019). Set-Based Models for Cryptocurrency Software. Retrieved from
Guo, S., Cao, S., & Guo, J. (2019). Study on Collaborative Algorithm for a Spherical Multi-robot System based on Micro-blockchain. In 2019 IEEE International Conference on Mechatronics and Automation (ICMA) (pp. 1465–1470).
Xue, X., Wang, C., Liu, W., Lv, H., Wang, M., & Zeng, X. (2019). A RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications. Micromachines, 10(8), 541.
Misic, J., Misic, V. B., Chang, X., Motlagh, S. G., & Ali, M. Z. (2019). Modeling of Bitcoin’s blockchain delivery network.
Chen, J., Lv, Z., & Song, H. (2019). Design of Personnel Big Data Management System Based on Blockchain. Future Generation Computer Systems.
Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET. Peer-to-Peer Networking and Applications.
Harris, J. D., & Waggoner, B. (2019). Decentralized & Collaborative AI on Blockchain. IEEE International Conference on Blockchain.
Xu, X., Chen, Y., Yuan, Y., Huang, T., Zhang, X., & Qi, L. (2019). Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimedia Tools and Applications.
Li, J., Yuan, Y., & Wang, F.-Y. (2019). A novel GSP auction mechanism for ranking Bitcoin transactions in blockchain mining. Decision Support Systems, 113094.
Manuskin, A., Mirkin, M., & Eyal, I. (2019). Ostraka: Secure Blockchain Scaling by Node Sharding. Retrieved from
Li, S., Qin, T., & Min, G. (2019). Blockchain based digital forensics investigation framework in the internet of things and social systems. IEEE Transactions on Computational  Social Systems. Retrieved from
Grover, P., Kar, A. K., & Janssen, M. (2019). Diffusion of blockchain technology. Journal of Enterprise Information Management.

Full-text search

Currently available on Zotero.

Metadata search

Searches only this subcollection.