Skip to main content

David LiuAbout 2 min

郑晨风3.77,120名

张国庆3.68,140

郭子桓2.93,48树莓

目前还有第一个part需要一位同学来认领,然后另外一位同学可以视情况做一些整体善后的工作啦,或者如果两位同学

There are different types of authenticated data structures in blockchain, such as digital signatures and digital watermarking⁴.

Digital signatures are a secure form of authentication where trust can be anchored on the digital signature of both parties⁴. Digital watermarking is a form of data origin authentication that gives data source authentication without any need to access the source data⁴.

Some examples of blockchain authentication include personal identity: user authentication and data protection, financial transactions, luxury, supply chain, food industry, and more¹.

I hope this helps! Let me know if you have any other questions.

源: 与必应的对话, 2023/4/9(1) Blockchain - Data Origin Authentication - GeeksforGeeks. https://www.geeksforgeeks.org/blockchain-data-origin-authentication/open in new window 访问时间 2023/4/9.
(2) 10 examples of blockchain authentication - BCdiploma. https://www.bcdiploma.com/en/blog/10-exemples-usage-authentification-blockchain-2021-08-17open in new window 访问时间 2023/4/9.
(3) Blockchain Architecture 101: Components, Structure, and Benefits. https://komodoplatform.com/en/academy/blockchain-architecture-101/open in new window 访问时间 2023/4/9.
(4) Blockchain as a Data Structure | Horizen Academy. https://www.horizen.io/academy/blockchain-as-a-data-structure/open in new window 访问时间 2023/4/9.
(5) Improved authenticated data structures for blockchain synchronization .... https://www.ideals.illinois.edu/items/107664open in new window 访问时间 2023/4/9.
(6) ADS4all : Democratizing Authenticated Data Structures - Springer. https://link.springer.com/chapter/10.1007/978-3-030-45989-5_24open in new window 访问时间 2023/4/9.
(7) Authenticated data structures for blockchain scalability. https://www.unsw.edu.au/engineering/student-life/undergraduate-research-opportunities/advertised-taste-research-areas/authenticated-data-structures-for-blockchain-scalabilityopen in new window 访问时间 2023/4/9.

I'm sorry but I couldn't find a top-level paper on the literature review of the latest blockchain authentication data structure. However, I found some papers that might be of interest to you.

Based on a structured, systematic review and thematic content analysis of the discovered literature, this paper presents a comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management, and establishes key themes, trends and emerging areas for research¹.

Another paper aims to identify and analyze peer-reviewed literature that seeks to use Blockchain smart contracts for securing the Internet in general and the Internet of Things in particular and presents the systematic analysis of the identified literature³.

I hope this helps! Let me know if you have any other questions.

源: 与必应的对话, 2023/4/9(1) A systematic literature review of blockchain-based applications .... https://www.sciencedirect.com/science/article/pii/S0736585318306324open in new window 访问时间 2023/4/9.
(2) A systematic literature review of blockchain and smart contract .... https://www.sciencedirect.com/science/article/abs/pii/S0164121220302818open in new window 访问时间 2023/4/9.
(3) A systematic literature review of blockchain cyber security. https://www.sciencedirect.com/science/article/pii/S2352864818301536open in new window 访问时间 2023/4/9.

²: Authenticated Data Structures, Generically by Michael W. Hicks and Stephen Tse
¹: Authenticated Data Structures - Brown University

源: 与必应的对话, 2023/4/9(1) Authenticated Data Structures, Generically. https://www.cs.umd.edu/~mwh/papers/gpads.pdfopen in new window 访问时间 2023/4/9.
(2) Authenticated Data Structures - Brown University. https://cs.brown.edu/research/pubs/pdfs/2003/Tamassia-2003-ADS.pdfopen in new window 访问时间 2023/4/9.
(3) Data Structure Examples - IBM. https://www.ibm.com/docs/en/i/7.1?topic=structures-data-structure-examplesopen in new window 访问时间 2023/4/9.
(4) Authenticated Data Structures | SpringerLink. https://link.springer.com/chapter/10.1007/978-3-540-39658-1_2open in new window 访问时间 2023/4/9.
(5) Authenticated Data Structures | SpringerLink. https://link.springer.com/chapter/10.1007/978-3-319-07584-6_9open in new window 访问时间 2023/4/9.