2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) 2019
DOI: 10.1109/tps-isa48467.2019.00031
|View full text |Cite
|
Sign up to set email alerts
|

Contextualizing Consensus Protocols in Blockchain: A Short Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 8 publications
0
2
0
1
Order By: Relevance
“…In [90], the authors present several consensus protocols for comparing the qualities of blockchain technology in terms of computation, vulnerabilities, and other factors. They provide a complete view of public and private blockchains and also present a taxonomy of all consensus protocols.…”
Section: Other Important Attacksmentioning
confidence: 99%
“…In [90], the authors present several consensus protocols for comparing the qualities of blockchain technology in terms of computation, vulnerabilities, and other factors. They provide a complete view of public and private blockchains and also present a taxonomy of all consensus protocols.…”
Section: Other Important Attacksmentioning
confidence: 99%
“…For IoT nodes, the computing power is relatively limited, and we need to apply the computing power to actual work scenarios without mining. Proof of Stake (PoW) and Proof of Assets (PoA) are two consensus algorithms proposed to reduce the waste of computing power caused by mining, but to a certain extent, they sacrifice the decentralization of the consensus algorithm [ 28 ]. In particular, PoA relies on preset authorized nodes (signers) to be responsible for generating blocks, so it has a high degree of centralization [ 29 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Bashar vd. [9] blok zinciri teknolojisini destekleyen çeşitli konsensüs protokollerini ele almakta ve bunları hesaplama zorluğu, güvenlik açıkları, maliyet açısından nesnel olarak karşılaştırmaktadır.…”
Section: Gi̇ri̇ş (Introduction)unclassified