skip to main content
10.1145/3581971acmotherconferencesBook PagePublication PagesicbtaConference Proceedingsconference-collections
ICBTA '22: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICBTA 2022: 2022 5th International Conference on Blockchain Technology and Applications Xi'an China December 16 - 18, 2022
ISBN:
978-1-4503-9757-5
Published:
06 April 2023

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session 1 - Models and Technologies of Blockchain in Economic Management
research-article
Decentralized Insurance Subrogation Using Blockchain

Subrogation in insurance is the legal right that an insurance company holds to recover the amount paid to the insured from the at-fault party. As of now, subrogation is a relatively manual, laborious, and time-consuming process, requiring many physical ...

research-article
Understanding Security Audits on Blockchain

Hacks on blockchains are prevalent nowadays because a wide range of vulnerabilities exists in smart contracts. To deal with the vulnerabilities, security auditing has been emerging and widely adopted for manual code inspection. However, little is known ...

research-article
Data Mining of Compound DeFi Project

The set of services by Decentralized Finance (DeFi) and by traditional finance intersects. Loans are examples of the intersection. Data scientists have no access to the loan data of the traditional banking system due to trade secrecy and client privacy ...

research-article
Data Mining of Uniswap Decentralized Exchange

The data from decentralized finance services is openly available once they operate in public blockchains. Although data encryption techniques for transaction exist, they are challenging, increase costs and decrease trust. Therefore, everyone can use ...

SESSION: Session 2 - Management and Application of Blockchain in Digital Currency
research-article
Open Access
A Smart and Private Blockchain-enabled Framework for Digital Assets

Nowadays, many digital assets are generated all the time, and managing these digital assets has become an important issue. The traditional digital asset management system manages data by the service provider, and data is not processed transparently. ...

research-article
A Distributed Authenticity Verification Scheme Using Deep Learning for NFT Market

With the recent proliferation of blockchains, identifying security risks to them has become an important issue. Among the various types of cyberattacks against blockchains, the blockchain poisoning attack involves the storing of malicious data in the ...

research-article
Adaptive Overclocking Mining Algorithm Selection Approach in the Cryptocurrency Mining Pool

Cryptocurrency is one of the hit topics under the web 3.0 era. The first and most widely used cryptocurrency is bitcoin. For example, miners use bitcoin mining mechanism to solve cryptographic puzzles in a mining competition and receive Bitcoins as a ...

research-article
NFT Scoring: An Analysis of the Considerable Features

As a cutting-edge technology, non-fungible tokens (NFT) have attracted a great deal of attention since 2021. Considering the numerous applications of these non-interchangeable digital assets in various industries and their tradability, NFTs have become ...

research-article
Understanding GasToken Adoption in the Ethereum Blockchain

GasTokens are created by smart contracts executing in the Ethereum blockchain to support a form of transaction fee pre-payment. Even though GasTokens had a period of significant activity on Ethereum (regularly surpassing half of the overall weekly smart ...

research-article
Open Access
Smart Contract Based Honey Production Supply Chain

In recent years, much more attention has been devoted to the management of honey bees, resulting in the slowing down of bee mortality and their improved protection. However, there are still some obstacles that prevent all-encompassing protection. In ...

SESSION: Session 3 - Structural Framework and Model of Blockchain in Information Management
research-article
Research on online learning resource sharing model based on alliance chain

Aiming at the problems of centralized management of online learning resources, unbalanced resource construction and difficult sharing of system resources in Guangdong Open University system, the article introduces alliance chain technology, summarizes ...

research-article
A Parallel Execution Model for Permissioned Blockchain Systems

At present, academics have researched the directions that may become performance bottlenecks in blockchain systems, such as consensus protocols, encryption algorithms and contract execution. For example, in recent years, many improvements to consensus ...

research-article
Open Access
A Proof of Concept of the integration of blockchain with an ISO 19152:2012 based Land Administration System

In recent years, we witnessed extensive study of the integration of blockchain technology in Land Administration System. It is believed that it would enhance transparency and trust. Besides, since 2012 and the publication of the ISO 19152 Land ...

research-article
A Blockchain-based Framework for News Fine-grained Detection and Management

The development of the Internet has revolutionized the news industry. While bringing various advantages, it has also caused an overflow of fake and malicious news, which has damaged social and economic benefits. In recent years, new news detection ...

research-article
An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity

The rise of the Industrial Internet has accelerated the integration of industrial enterprise networks and introduced the problem of cybersecurity while improving productivity. The traditional Purdue Enterprise Reference Architecture (PERA) has found it ...

research-article
PShard: A Practical Sharding Protocol for Enterprise Blockchain

Enterprise blockchain is commonly a permissioned blockchain that processes complex and massive transactions among enterprises for cooperation. With the continuous increase of business scale, the performance of a single blockchain is difficult to meet ...

research-article
Improving Healthcare Record Management System in Indonesia by Using Blockchain Technology

Over time as the growth of IoT and other technology has grown rapidly over the years, so does the usage of blockchain technology, nowadays even many industrial activities use blockchain technology due to the nature of the blockchain itself to be ...

research-article
AmIOnline: Blockchain-based Availability Testing Service

Information technology has penetrated into all spheres of activity, and the business sphere is not an exception. The uninterrupted and efficient operation of these technologies guarantees the efficiency of business processes and the entire work of the ...

research-article
OnlyTips: Blockchain-Driven Tips Service

Gratuity (tips) plays a valuable role in the service sector. Tips exist in many countries more and more in a digital format. But digital tips lack transparency: givers have no proof of delivery, and recipients have no proof of assessing all the ...

SESSION: Session 4 - Blockchain Information Authentication and Security
research-article
Privacy-preserving Charging Station Recommendation System for Electric Vehicles over Blockchain

Electric vehicle (EV) charging station recommendation system is used to recommend charging stations to EVs in the same area for specific purposes, such as reducing traffic congestion, balancing grid load, or fully utilizing charging station resources. ...

research-article
Open Access
Self-Sovereign Identity for Privacy-Preserving Shipping Verification System

Internet made it easier for organizations and individuals to collaborate with each other in different activities in order to provide new goods and services to their customers. As for example, e-commerce facilitates the discovery of new partners and ...

research-article
Blockchain for Storing Shadow Data of IoT Devices

The demand for secure storage of shadow service data of Internet of things devices makes the traditional centralized platform storage method unable to ensure the security and credibility of key data. This paper analyzes that the main security risks ...

research-article
LEChain:Linear Credit Evaluation System Based on Hyperledger Fabric Blockchain

Data sharing among different institutions can enhance the integrity of information to evaluate the credit level of financing enterprises more accurately, but it also faces the problems of privacy leakage and data fraud. To solve these problems, this ...

research-article
Understanding the Use of Blockchain in Medical Data Security: A Systematic Literature Review

Data security is one of the technology trends in Indonesia that arose with the emergence of digital transformation. However, many industries in Indonesia, such as the healthcare industry, did not focus on applying the best security practices in securing ...

research-article
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain

Enterprise blockchain applications have been widely adopted and the data scale on blockchain increases rapidly in recent years. In practical application, participants prefer to store most of the business data in local database systems and only provide ...

Index terms have been assigned to the content through auto-classification.

Recommendations