Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00043
Shanshan Gu, Jun Hu
As the rapid development of network and Blockchain technology, there are a lot of challenges associated with Blockchain and network based applications. In this paper, targeted at the security issues of these applications, especially combined with historical nihilism influence, a comprehensive researches and analysis has been made, where the new characteristics of historical nihilism is presented in the latest Blockchain network environments. And then the significant influences of historical nihilism imposed on network environments are analyzed, especially for the impact on the identification for different human groups with politics ideology. In addition, the challenges of preventing historical nihilism under new media scenarios are also analyzed. Based on these new characteristics and challenges of historical nihilism presented in Blockchain network, several efficient solutions are provided in this paper, which can effectively prevent the harmful influence of historical nihilism from human's ideologies and improve the security level of today's network environment.
{"title":"Research and Analysis for the Network Improvement with Blockchain and Historical Nihilism","authors":"Shanshan Gu, Jun Hu","doi":"10.1109/SmartBlock52591.2020.00043","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00043","url":null,"abstract":"As the rapid development of network and Blockchain technology, there are a lot of challenges associated with Blockchain and network based applications. In this paper, targeted at the security issues of these applications, especially combined with historical nihilism influence, a comprehensive researches and analysis has been made, where the new characteristics of historical nihilism is presented in the latest Blockchain network environments. And then the significant influences of historical nihilism imposed on network environments are analyzed, especially for the impact on the identification for different human groups with politics ideology. In addition, the challenges of preventing historical nihilism under new media scenarios are also analyzed. Based on these new characteristics and challenges of historical nihilism presented in Blockchain network, several efficient solutions are provided in this paper, which can effectively prevent the harmful influence of historical nihilism from human's ideologies and improve the security level of today's network environment.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00028
Jun Guo, Hongbo Zhou, Lan Yang, Xuhui Chen
As a decentralized network structure based on P2P network and with cryptography as its core, blockchain technology establishes trust relationship on the network by pure mathematical method without relying on intermediate platform. There are three problems in traditional digital copyright industry: difficult to confirm the rights, difficult to authorize rights and difficult to maintain rights. This paper makes a deep research on the blockchain technology of digital copyright. With the help of self-supervision, traceability and decentralization of blockchain technology, as well as the Map function, we can improve the data transmission rate in the multi-channel model and obtain accurate time complexity values. Hence the probability of all kinds of digital copyright infringement events is greatly reduced.
{"title":"Research on digital copyright blockchain technology","authors":"Jun Guo, Hongbo Zhou, Lan Yang, Xuhui Chen","doi":"10.1109/SmartBlock52591.2020.00028","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00028","url":null,"abstract":"As a decentralized network structure based on P2P network and with cryptography as its core, blockchain technology establishes trust relationship on the network by pure mathematical method without relying on intermediate platform. There are three problems in traditional digital copyright industry: difficult to confirm the rights, difficult to authorize rights and difficult to maintain rights. This paper makes a deep research on the blockchain technology of digital copyright. With the help of self-supervision, traceability and decentralization of blockchain technology, as well as the Map function, we can improve the data transmission rate in the multi-channel model and obtain accurate time complexity values. Hence the probability of all kinds of digital copyright infringement events is greatly reduced.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00036
Yaping Zeng
The popularity of the Internet has accelerated the circulation of digital resources, and the problem of copyright management of digital resources has become prominent. The introduction of block chain technology has a breakthrough meaning for the solution of digital resource copyright management. Based on the development of block chain technology, this article combines digital music resource copyright management with block chain technology by establishing a research model. In this way, the issues of copyright protection and transaction management of digital music resources are explored in depth. This article aims at the decentralization of blockchain technology and other features requiring the intervention of relevant authorities, in order to enhance the credibility of digital music resource copyright transactions by using blockchain technology.
{"title":"Digital Music Resource Copyright Management Mechanism Based on Blockchain","authors":"Yaping Zeng","doi":"10.1109/SmartBlock52591.2020.00036","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00036","url":null,"abstract":"The popularity of the Internet has accelerated the circulation of digital resources, and the problem of copyright management of digital resources has become prominent. The introduction of block chain technology has a breakthrough meaning for the solution of digital resource copyright management. Based on the development of block chain technology, this article combines digital music resource copyright management with block chain technology by establishing a research model. In this way, the issues of copyright protection and transaction management of digital music resources are explored in depth. This article aims at the decentralization of blockchain technology and other features requiring the intervention of relevant authorities, in order to enhance the credibility of digital music resource copyright transactions by using blockchain technology.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00025
Han Deng, Yan Cheng, H. Qiu, Meiyan Pang, Peiyuan Zhu, Hui Zhao, Yujie Hong
In recent years, block chain has gradually become a hot spot of technological innovation, and the common operation of bitcoin wallets can also leak some user information, which has been exploited in the past. Combining different outputs into a single transaction input by wallets is a common form of privacy leakage. This article proposes a new type of distributed, decentralized, and trustless technical solution. Firstly, the design and implementation of the blockchain are studied from a technical perspective. Then, the security of the blockchain is analyzed from both the blockchain itself and the application. Finally, the blockchain security system and traditional centralized security system are compared from the perspective of security architecture. This article introduces a new distributed data storage technology, which has led to changes in system and program design concepts, and may subvert the current organization model of business society.
{"title":"Design and Implementation of Digital Transaction System Based on Blockchain Environment","authors":"Han Deng, Yan Cheng, H. Qiu, Meiyan Pang, Peiyuan Zhu, Hui Zhao, Yujie Hong","doi":"10.1109/SmartBlock52591.2020.00025","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00025","url":null,"abstract":"In recent years, block chain has gradually become a hot spot of technological innovation, and the common operation of bitcoin wallets can also leak some user information, which has been exploited in the past. Combining different outputs into a single transaction input by wallets is a common form of privacy leakage. This article proposes a new type of distributed, decentralized, and trustless technical solution. Firstly, the design and implementation of the blockchain are studied from a technical perspective. Then, the security of the blockchain is analyzed from both the blockchain itself and the application. Finally, the blockchain security system and traditional centralized security system are compared from the perspective of security architecture. This article introduces a new distributed data storage technology, which has led to changes in system and program design concepts, and may subvert the current organization model of business society.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00014
Yanfang Lei, Zhijuan Jia, Yanyan Yang, Yage Cheng, Junjun Fu
In order to better realize the storage and sharing of data in the cloud and ensure the validity of data privacy and access authorization, this paper proposes a cloud data access authorization update scheme based on Blockchain, which supports keyword retrieval. Firstly, the risk of collusion attack is effectively reduced by using ciphertext storage separately. Secondly, the method of splitting and managing the proxy re-encryption key parameters can achieve the purpose of deterministic authority update only when the access authority changes and only needs to update the key parameter management. In addition, the scheme alleviates the amount of computation of users during data sharing and the pressure of high-frequency access of cloud storage. Through security analysis, the scheme is safe under the ciphertext attack. Finally, a numerical simulation is given to verify the efficiency of the scheme algorithm.
{"title":"A Cloud Data Access Authorization Update Scheme Based on Blockchain","authors":"Yanfang Lei, Zhijuan Jia, Yanyan Yang, Yage Cheng, Junjun Fu","doi":"10.1109/SmartBlock52591.2020.00014","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00014","url":null,"abstract":"In order to better realize the storage and sharing of data in the cloud and ensure the validity of data privacy and access authorization, this paper proposes a cloud data access authorization update scheme based on Blockchain, which supports keyword retrieval. Firstly, the risk of collusion attack is effectively reduced by using ciphertext storage separately. Secondly, the method of splitting and managing the proxy re-encryption key parameters can achieve the purpose of deterministic authority update only when the access authority changes and only needs to update the key parameter management. In addition, the scheme alleviates the amount of computation of users during data sharing and the pressure of high-frequency access of cloud storage. Through security analysis, the scheme is safe under the ciphertext attack. Finally, a numerical simulation is given to verify the efficiency of the scheme algorithm.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00020
Yuchong Li, Lijian Zhang, Yuguo Wu, Dong Wei
Physical layer security has recently emerged as a promising approach to provide secure wireless communications. Physical layer security technology is the key means to achieve security and communication integration. The built-in security mechanism based on the characteristics of wireless channel provides a feasible idea for the realization of “one secret at a time”. It has important application prospects in integrity protection of service data, Internet of things (IoT) lightweight encryption and blockchain wireless security technology. In this paper, we consider the scenario of a unicast multiuser multiple-input single-output (MISO) downlink system in the presence of multiple single-antenna passive eavesdroppers. Instead of assuming perfect channel state information (CSI), we investigate the artificial noise (AN)-aided robust transmit beamforming scheme with imperfect CSI on legitimate receivers and no CSI regarding eavesdroppers at the transmitter. Under the fixed total transmit power, the information symbol and the AN are transmitted concurrently. We aim to guarantee each legitimate receiver's signal-to-interference-and-noise ratio(SINR) outage probability below a preset level with minimum power. Hence, as much power as possible can be allocated to AN to confuse the eavesdroppers. In order to reduce the negative impact on the legitimate receivers, the AN is transmitted in the null space of the estimated legitimate channels. To deal with this nonconvex optimization problem, a rank relaxed formulation is obtained by employing semidefinite relaxation (SDR). Then we propose two approaches by using Bernstein-type inequality and S-procedure, respectively, to transform the probabilistic constraints into deterministic constraints. The optimization problem is reformulated as a convex semidefinite program (SDP). Simulation results show that the proposed approaches have better performances than the non-robust approach.
{"title":"Robust Secure Beamforming for Multiuser MISO Wiretap Channels","authors":"Yuchong Li, Lijian Zhang, Yuguo Wu, Dong Wei","doi":"10.1109/SmartBlock52591.2020.00020","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00020","url":null,"abstract":"Physical layer security has recently emerged as a promising approach to provide secure wireless communications. Physical layer security technology is the key means to achieve security and communication integration. The built-in security mechanism based on the characteristics of wireless channel provides a feasible idea for the realization of “one secret at a time”. It has important application prospects in integrity protection of service data, Internet of things (IoT) lightweight encryption and blockchain wireless security technology. In this paper, we consider the scenario of a unicast multiuser multiple-input single-output (MISO) downlink system in the presence of multiple single-antenna passive eavesdroppers. Instead of assuming perfect channel state information (CSI), we investigate the artificial noise (AN)-aided robust transmit beamforming scheme with imperfect CSI on legitimate receivers and no CSI regarding eavesdroppers at the transmitter. Under the fixed total transmit power, the information symbol and the AN are transmitted concurrently. We aim to guarantee each legitimate receiver's signal-to-interference-and-noise ratio(SINR) outage probability below a preset level with minimum power. Hence, as much power as possible can be allocated to AN to confuse the eavesdroppers. In order to reduce the negative impact on the legitimate receivers, the AN is transmitted in the null space of the estimated legitimate channels. To deal with this nonconvex optimization problem, a rank relaxed formulation is obtained by employing semidefinite relaxation (SDR). Then we propose two approaches by using Bernstein-type inequality and S-procedure, respectively, to transform the probabilistic constraints into deterministic constraints. The optimization problem is reformulated as a convex semidefinite program (SDP). Simulation results show that the proposed approaches have better performances than the non-robust approach.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00012
Hongguo Zhao, Yunxia Liu, Yonghao Wang, Yu Huang
The legitimate owner interests protection of traditional digital videos has become an increasingly demand with the rapid development of internet video applications. The development of Blockchain, which provides decentralization, traceability, and high credibility attributes has provided a technical inspiration for digital video legitimate interests protection. In this paper, we propose a novel and effective security protection framework by hiding secret data in the digital video of the Blockchain network. On the Blockchain network side, we upload the secret data referred to video to Blockchain network; on the traditional server side, we use smart contract to manipulate the procedures of embedding and extraction of secret data which has been embedded into digital video. Then, we could verify, trace and protect the secret data which are stored into Blockchain network and digital video contents itself, respectively. It is proven that the proposed framework could achieve high efficiency and accurate performance on digital video security protection.
{"title":"Hiding Data into Blockchain-based Digital Video for Security Protection","authors":"Hongguo Zhao, Yunxia Liu, Yonghao Wang, Yu Huang","doi":"10.1109/SmartBlock52591.2020.00012","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00012","url":null,"abstract":"The legitimate owner interests protection of traditional digital videos has become an increasingly demand with the rapid development of internet video applications. The development of Blockchain, which provides decentralization, traceability, and high credibility attributes has provided a technical inspiration for digital video legitimate interests protection. In this paper, we propose a novel and effective security protection framework by hiding secret data in the digital video of the Blockchain network. On the Blockchain network side, we upload the secret data referred to video to Blockchain network; on the traditional server side, we use smart contract to manipulate the procedures of embedding and extraction of secret data which has been embedded into digital video. Then, we could verify, trace and protect the secret data which are stored into Blockchain network and digital video contents itself, respectively. It is proven that the proposed framework could achieve high efficiency and accurate performance on digital video security protection.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00026
Lijun Xiao, Zuoting Ning, Wei Liang, Jin Guo, Lu Li
Internet finance has developed rapidly in the Internet Plus wave, however, some urgent issues, such as security, trustworthiness, and network performance, are emerging. This paper explores these problems for Internet finance. Based on the combination of blockchain and network coding, we propose innovative solutions to overcome these problems for internet finance to promote the development of internet finance. Experimental results and analysis demonstrate that the proposed scheme harvests good performance in terms of security and delay.
{"title":"A Novel Research in Internet Finance Combining With Blockchain and Network Coding","authors":"Lijun Xiao, Zuoting Ning, Wei Liang, Jin Guo, Lu Li","doi":"10.1109/SmartBlock52591.2020.00026","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00026","url":null,"abstract":"Internet finance has developed rapidly in the Internet Plus wave, however, some urgent issues, such as security, trustworthiness, and network performance, are emerging. This paper explores these problems for Internet finance. Based on the combination of blockchain and network coding, we propose innovative solutions to overcome these problems for internet finance to promote the development of internet finance. Experimental results and analysis demonstrate that the proposed scheme harvests good performance in terms of security and delay.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"14 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00037
Xinxin Liu, Minghui Zhang, Yuanpan Zheng, Yanyan Yang
Aiming at the problem of repetitive spending in the current blockchain e-cash transactions, a linkable ring signature scheme is proposed for blockchain. Based on the linkability of the signature, it can judge whether two signatures are generated by the same signer, which solves the double blossom problem in the e-cash transaction and ensures the anonymity of the transaction. In order to solve the problem of too long signature length in ring signature, the aggregate signature technology is introduced to generate short signature with fixed length. After security analysis, the scheme has anonymity and unforgeability, and can resist the at-tack of double blossom. Compared with the equivalent scheme, this scheme has lower storage cost and higher processing efficiency.
{"title":"A linkable Ring Signature Electronic Cash Scheme Based on Blockchain","authors":"Xinxin Liu, Minghui Zhang, Yuanpan Zheng, Yanyan Yang","doi":"10.1109/SmartBlock52591.2020.00037","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00037","url":null,"abstract":"Aiming at the problem of repetitive spending in the current blockchain e-cash transactions, a linkable ring signature scheme is proposed for blockchain. Based on the linkability of the signature, it can judge whether two signatures are generated by the same signer, which solves the double blossom problem in the e-cash transaction and ensures the anonymity of the transaction. In order to solve the problem of too long signature length in ring signature, the aggregate signature technology is introduced to generate short signature with fixed length. After security analysis, the scheme has anonymity and unforgeability, and can resist the at-tack of double blossom. Compared with the equivalent scheme, this scheme has lower storage cost and higher processing efficiency.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121640018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1109/SmartBlock52591.2020.00017
Meikang Qiu, Xinxin Liu, Yiren Qi, Hui Zhao, Meiqin Liu
The emergence of blockchain has attracted many researchers from various fields to use its distinctive features to solve different problems. One of the issues that can be mitigated is network security. Blockchain is a decentralized ledger without the control of a central authority. It tracks all transactions and registers them on the digital block. These blocks are immutable, immutable and distributed. This paper introduces the challenges facing network security and the opportunities for network security using blockchain.
{"title":"AI Enhanced Blockchain (I)","authors":"Meikang Qiu, Xinxin Liu, Yiren Qi, Hui Zhao, Meiqin Liu","doi":"10.1109/SmartBlock52591.2020.00017","DOIUrl":"https://doi.org/10.1109/SmartBlock52591.2020.00017","url":null,"abstract":"The emergence of blockchain has attracted many researchers from various fields to use its distinctive features to solve different problems. One of the issues that can be mitigated is network security. Blockchain is a decentralized ledger without the control of a central authority. It tracks all transactions and registers them on the digital block. These blocks are immutable, immutable and distributed. This paper introduces the challenges facing network security and the opportunities for network security using blockchain.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}