A type of public-key encryption where the secret key of a user and the ciphertext are dependent upon attributes (e.g., role, department, location). A user can decrypt a ciphertext if and only if…...
Read MoreAudit Trail Verification is the comprehensive process of examining and confirming the integrity, accuracy, authenticity, and completeness of an audit trail. An audit trail itself is a chronological…...
Read MoreA form of encryption that simultaneously provides confidentiality (the message is unreadable to outsiders), integrity (the message has not been tampered with), and authenticity (the message…...
Read MoreA type of authenticated encryption that not only ensures confidentiality, integrity, and authenticity for the encrypted message (plaintext), but also provides integrity and authenticity for…...
Read MoreA mobile application (e.g., Google Authenticator) generating time‑based one‑time passwords (TOTP) for two‑factor authentication....
Read MoreA system that autonomously controls the provision and allocation of liquidity in decentralized finance (DeFi) protocols through algorithms and smart contracts. These systems optimize capital…...
Read MoreA decentralized exchange protocol that uses mathematical formulas and liquidity pools to enable permissionless trading of digital assets without traditional order books or intermediaries. AMMs allow…...
Read MoreA blockchain security process that uses AI and formal verification techniques to automatically identify vulnerabilities in smart contract code and generate corrective patches without human…...
Read MoreA systematic process that uses specialized tools to automatically analyze blockchain code, smart contracts, and decentralized applications for security vulnerabilities, coding errors, and compliance…...
Read MoreA blockchain protocol extension that enables merge mining by allowing a blockchain to accept proof-of-work from another chain as valid. Auxiliary Proof-of-Work (AuxPoW) creates a mechanism for…...
Read MoreA family of consensus protocols that uses repeated random subsampling of network participants to quickly reach agreement on transaction validity. Avalanche consensus achieves high throughput, low…...
Read MoreA smart contract deliberately engineered with hidden functionality that grants privileged access or control to its creator while appearing legitimate to users and auditors. These concealed mechanisms…...
Read MoreA transaction ordering strategy where an entity places their transaction immediately after a target transaction in the same block to capitalize on the state changes created by the preceding…...
Read MoreA trading mechanism in decentralized finance that accumulates multiple orders over a specified time period before executing them together in a single transaction at a uniform clearing price. Unlike…...
Read MoreA gas-optimized process for creating multiple NFTs or tokens in a single blockchain transaction rather than minting each asset individually. This technique significantly reduces the overall cost and…...
Read MoreA power continuity system that provides temporary electricity to blockchain nodes, validators, or mining equipment during grid power interruptions to prevent unscheduled downtime and associated…...
Read MoreA blockchain that coordinates consensus, validator participation, and cross-shard communication in sharded blockchain systems. The Beacon Chain serves as the central coordination mechanism that…...
Read MoreThe application of data analysis techniques to blockchain transaction patterns to identify user behaviors, detect anomalies, and predict future actions based on historical patterns. This field…...
Read MoreA system that assigns trustworthiness scores to blockchain addresses or entities based on their historical transaction patterns and interactions rather than their identity. These reputation scores…...
Read MoreA systematic process of measuring a blockchain network's performance metrics or a smart contract's efficiency against defined standards or competing solutions. This comparative analysis evaluates…...
Read MoreA regulatory requirement compelling blockchain projects, DAOs, or crypto businesses to disclose the identities of individuals who ultimately control or significantly benefit from the entity,…...
Read MoreThe difference between the lowest price a seller is willing to accept (ask) and the highest price a buyer is willing to pay (bid) in an order‑book market....
Read MoreA blockchain network launched by cryptocurrency exchange Binance that runs parallel to the Binance Chain, adding smart contract functionality and compatibility with the Ethereum Virtual Machine (EVM…...
Read MoreThe design and flow considerations for user interactions when authenticating via biometric modalities (fingerprint, face, iris) in applications....
Read MoreUse of fingerprint, face recognition, or other biometric factors to unlock wallets or authorize transactions....
Read MoreThe process of securely linking a user’s biometric template to their identity or cryptographic credentials....
Read MoreAn advocate who believes Bitcoin is the only cryptocurrency of lasting value and that other chains are redundant or inferior....
Read MoreThe world's first decentralized peer-to-peer electronic cash system built on blockchain technology, created by Satoshi Nakamoto in 2009. The Bitcoin Network enables secure, pseudonymous transactions…...
Read MoreA distributed storage layer for large binary objects (“blobs”) anchored by blockchain commitments to ensure data availability and integrity....
Read MoreA blockchain is a decentralized, distributed, and immutable digital ledger used to record transactions or any digital interaction in a secure and transparent manner. These records are grouped into '…...
Read MoreCollaborative alliances of universities and research institutions that pool resources to study blockchain technology, standards, and societal impact....
Read MoreFormalized frameworks and best practices for assessing the security, correctness, and compliance of blockchain systems and smart contracts....
Read MoreTechniques and tools for graphically representing on‑chain and off‑chain blockchain metrics to aid analysis and decision‑making....
Read MoreEthical hacking exercises that simulate attacks on blockchain nodes, smart contracts, and associated infrastructure to uncover vulnerabilities....
Read MoreA specialized organization that conducts and publishes research on blockchain technology, use cases, and economic impact....
Read MorePeer‑reviewed or preprint scholarly articles that present new findings, models, or analyses in blockchain science and engineering....
Read More