2019
DOI: 10.1007/s11192-019-03170-4
|View full text |Cite
|
Sign up to set email alerts
|

The rise of “blockchain”: bibliometric analysis of blockchain study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
64
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 156 publications
(78 citation statements)
references
References 74 publications
0
64
0
Order By: Relevance
“…On a historical perspective, blockchain research has progressed from "Bitcoin" to "smart contract" to "proof of stake" to current research in blockchain scaling [11]. Concerning future trends, the current trend involves lowering the transaction costs for the blockchain networks [12]. It is estimated that a decline in transaction costs past certain threshold values will lead to severe disruption in business.…”
Section: Results: Development Of a Classification Frameworkmentioning
confidence: 99%
“…On a historical perspective, blockchain research has progressed from "Bitcoin" to "smart contract" to "proof of stake" to current research in blockchain scaling [11]. Concerning future trends, the current trend involves lowering the transaction costs for the blockchain networks [12]. It is estimated that a decline in transaction costs past certain threshold values will lead to severe disruption in business.…”
Section: Results: Development Of a Classification Frameworkmentioning
confidence: 99%
“…This growing ledger is immutable by design. Although blockchain was originally used in finance-related applications, it has been extended to non-finance applications, such as internet-of-things (IoT) and healthcare [ 2 ]. Its application in manufacturing improves real-time transparency, reduces cost, and assures sustainability [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, studies have shown that there is a number of detection approaches available to combat the increasing number of malicious URLs. For an instant, the signature-based and behavioral based technique [14] is used to detect malicious URLs [15,16]. In particular, the signature analysis aims at detecting malicious URLs by analyzing their signature.…”
Section: Introductionmentioning
confidence: 99%