2018 International Conference on Information , Communication, Engineering and Technology (ICICET) 2018
DOI: 10.1109/icicet.2018.8533868
|View full text |Cite
|
Sign up to set email alerts
|

Review Paper on Untwist Blockchain: A Data Handling Process of Blockchain Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…In IoT, one of the most popular integrated blockchain platform is Ethereum, although it was not designed especially for IoT. A private blockchain is a preferred option over a public one for implementation within a single organization due to its high efficiency, fast transaction speed, low cost, permissioned consensus and easy data handling and access [57][58]. In addition, Ethereum supports the use of private blockchain, which can be modified and utilized to fit in different IoT scenarios.…”
Section: Resultsmentioning
confidence: 99%
“…In IoT, one of the most popular integrated blockchain platform is Ethereum, although it was not designed especially for IoT. A private blockchain is a preferred option over a public one for implementation within a single organization due to its high efficiency, fast transaction speed, low cost, permissioned consensus and easy data handling and access [57][58]. In addition, Ethereum supports the use of private blockchain, which can be modified and utilized to fit in different IoT scenarios.…”
Section: Resultsmentioning
confidence: 99%
“…Some reviews have been conducted to address security issues in IDSs using blockchain technology. For instance, Kolekar et al [1] conducted an overview of blockchain technology and IDS showing the integration between blockchain and IDS. Meanwhile, Shreevyas et al [2] discussed the usage of blockchain in IDSs as a trusted technique used to detect cyberattacks.…”
Section: Comparison With Exiting Reviewsmentioning
confidence: 99%