Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    REVIEW

    Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization

    Saha Reno1,#,*, Koushik Roy2,#

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2061-2119, 2025, DOI:10.32604/cmc.2025.066366 - 03 July 2025

    Abstract The blockchain trilemma—balancing decentralization, security, and scalability—remains a critical challenge in distributed ledger technology. Despite significant advancements, achieving all three attributes simultaneously continues to elude most blockchain systems, often forcing trade-offs that limit their real-world applicability. This review paper synthesizes current research efforts aimed at resolving the trilemma, focusing on innovative consensus mechanisms, sharding techniques, layer-2 protocols, and hybrid architectural models. We critically analyze recent breakthroughs, including Directed Acyclic Graph (DAG)-based structures, cross-chain interoperability frameworks, and zero-knowledge proof (ZKP) enhancements, which aim to reconcile scalability with robust security and decentralization. Furthermore, we evaluate the trade-offs More >

  • Open Access

    ARTICLE

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

    Hsiao-Chun Han, Der-Chen Huang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3921-3941, 2025, DOI:10.32604/cmes.2025.065627 - 30 June 2025

    Abstract With the increasing importance of supply chain transparency, blockchain-based data has emerged as a valuable and verifiable source for analyzing procurement transaction risks. This study extends the mathematical model and proof of ‘the Overall Performance Characteristics of the Supply Chain’ to encompass multiple variables within blockchain data. Utilizing graph theory, the model is further developed into a single-layer neural network, which serves as the foundation for constructing two multi-layer deep learning neural network models, Feedforward Neural Network (abbreviated as FNN) and Deep Clustering Network (abbreviated as DCN). Furthermore, this study retrieves corporate data from the… More > Graphic Abstract

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

  • Open Access

    ARTICLE

    Leveraging Sharding-Based Hybrid Consensus for Blockchain

    Hind Baageel1, Md Mahfuzur Rahman1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1215-1233, 2024, DOI:10.32604/cmc.2024.055908 - 15 October 2024

    Abstract The advent of blockchain technology has transformed traditional methods of information exchange, shifting reliance from centralized data centers to decentralized frameworks. While blockchain’s decentralization and security are strengths, traditional consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS) face limitations in scalability. PoW achieves decentralization and security but struggles with scalability as transaction volumes grow, while PoS enhances scalability, but risks centralization due to monopolization by high-stake participants. Sharding, a recent advancement in blockchain technology, addresses scalability by partitioning the network into shards that process transactions independently, thereby improving throughput and reducing… More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption

    Mohanad A. Mohammed*, Hala B. Abdul Wahab

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1731-1748, 2024, DOI:10.32604/cmes.2023.030528 - 17 November 2023

    Abstract Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges. Concurrently, the Internet of Things (IoT) has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services, ultimately enhancing human lives. This paper presents a new approach utilizing lightweight blockchain technology, effectively reducing the computational burden typically associated with conventional blockchain systems. By integrating this lightweight blockchain with IoT systems, substantial reductions in implementation time and computational complexity can be achieved. Moreover, the paper proposes the utilization of the Okamoto More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920 - 23 April 2023

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a… More >

  • Open Access

    ARTICLE

    Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries

    G. Sharmila1,*, M. K. Kavitha Devi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1743-1758, 2023, DOI:10.32604/csse.2023.032127 - 03 November 2022

    Abstract Over the past era, subgraph mining from a large collection of graph database is a crucial problem. In addition, scalability is another big problem due to insufficient storage. There are several security challenges associated with subgraph mining in today’s on-demand system. To address this downside, our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs (BCCA-LSDG). The two-fold process is handled in the proposed BCCA-LSDG: graph indexing and authenticated query search (query processing). A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of… More >

  • Open Access

    ARTICLE

    Enhancing Blockchain Security Using Ripple Consensus Algorithm

    A. Baseera1, Abeer Abdullah Alsadhan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538 - 28 July 2022

    Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches More >

  • Open Access

    ARTICLE

    A Novel GLS Consensus Algorithm for Alliance Chain in Edge Computing Environment

    Huijuan Wang1, *, Jiang Yong1, Qingwei Liu2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 963-976, 2020, DOI:10.32604/cmc.2020.09803 - 23 July 2020

    Abstract Edge computing devices are widely deployed. An important issue that arises is in that these devices suffer from security attacks. To deal with it, we turn to the blockchain technologies. The note in the alliance chain need rules to limit write permissions. Alliance chain can provide security management functions, using these functions to meet the management between the members, certification, authorization, monitoring and auditing. This article mainly analyzes some requirements realization which applies to the alliance chain, and introduces a new consensus algorithm, generalized Legendre sequence (GLS) consensus algorithm, for alliance chain. GLS algorithms inherit More >

Displaying 1-10 on page 1 of 9. Per Page