-
1281
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
1282
Methods of committing criminal offences related to raiding
Published 2024-06-01“…The mandatory features of each of the criminal offences under study are: 1) the use of pseudo-legal mechanisms, which may include the use of forged documents, seals, stamps, conclusion of fictitious transactions, etc.; 2) the focus, which is not on the simple acquisition of objects or certain assets of a business entity, but on the rights to an enterprise, institution, organisation with its production facilities, etc. …”
Get full text
Article -
1283
Digitalisation Profile of the Elderly and ‘Grey Digital Violence’
Published 2024-12-01“…The purposes of the elderly to use digital technologies generally meet their needs such as communicating with family members, friends or relatives, socialising, obtaining information, making official transactions (making hospital appointments, paying bills, etc.). …”
Get full text
Article -
1284
Budgeting and Performance of Financial Institutions: A Case Study of Lyamujungu SACCO in Kabale Municipality.
Published 2023“…The study concludes that there is a role played by budgeting in the performance of Lyamujungu Sacco the findings showed that Lyamujungu Sacco practiced budgeting on whatever transaction they were making, it was therefore concluded that improved communication, budgeting, financial control of inputs, planning, and coordination were the roles played by budgeting, increased profits, reduces wastage of resources, were the other roles played by budgeting in MFis. …”
Get full text
Thesis -
1285
Designing a model to improve the behavior of Iranian handicrafts e-commerce customers by increasing customer trust
Published 2024-09-01“…Trust is the consumer's belief that the transaction will be carried out according to the plan. …”
Get full text
Article -
1286
Assessment of economic risks in Ukrainian enterprises: Management aspect
Published 2023-03-01“…It was found that the most attractive for investing funds due to the absence of loss-making enterprises in 2021 are large enterprises of such types of economic activities as temporary accommodation and catering, financial and insurance activities, real estate transactions, as well as professional, scientific and technical activities. …”
Get full text
Article -
1287
Commissioning health services for First Nations, regional, and remote populations: a scoping review
Published 2025-01-01“…Challenges related to inflexible funding, high transaction costs, overcompliance, and poor relationships. …”
Get full text
Article -
1288
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01“…This is achieved using an incremental value configured at the fog node, allowing authentication requests to be processed without generating new challenges for each transaction. For real-time data integrity, we propose an integrity verification algorithm that cross-references hash values stored in the cloud and blockchain, enabling fast and lightweight integrity checks. …”
Get full text
Article -
1289
Corporate tax avoidance and firm performance: the moderating role of ownership concentration and board independence
Published 2025-12-01“…Nevertheless, agency theory explains the opportunistic behavior of manager who can reduce the tax obligation by using various complex transactions to fulfill their personal interest. Therefore, the present study explores the relationship between corporate tax avoidance and firm performance. …”
Get full text
Article -
1290
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
1291
UTAUT Model Analysis on the Use of Siplah (Survey to BOSP Treasurers Under the Auspices of Cadisdikwil VII West Java Province)
Published 2025-01-01“…Suggestions based on the research results can be used by the Ministry of Education and Culture to improve SIPLah to make it more adaptive so that all transactions carried out by the BOSP Treasurer can use SIPLah. …”
Get full text
Article -
1292
The efficiency of tracking gold exchange-traded funds in the Tehran Stock Exchange: analysis of tracking error and double beta model
Published 2024-12-01“…In addition, by examining the two regimes of the rising and falling markets, the results obtained from the regression model show that the tracking efficiency in the two market regimes is different in terms of influence on most funds, as the tracking error in gold funds is influenced by factors such as the volume of transactions. (liquidity), daily fluctuations (noise), and absolute value of price deviation (arbitrage).Originality/Value: Unlike mutual funds, which are evaluated based on risk and return criteria, an investor should choose and select investments by considering how far the fund can follow its model index.…”
Get full text
Article -
1293
A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices
Published 2025-07-01“…As business performance increasingly depends on decentralized, tamper-proof records to manage transactions and data flows, adopting blockchain technology (BCT) is becoming crucial for remaining competitive in the digital and globalized economy. …”
Get full text
Article -
1294
Identification and Correction of Abnormal, Incomplete Power Load Data in Electricity Spot Market Databases
Published 2025-01-01“…Accurate load forecasting relies on high-quality historical load data, with complete load data serving as the cornerstone for both forecasting and transactions in electricity spot markets. However, historical load data at the distribution network or user level often suffers from anomalies and missing values. …”
Get full text
Article -
1295
Effect of Financial Literacy on the Profitability of Small-Scale Enterprises in Rubaare Town Council Ntungamo District.
Published 2024“…The study also recommends that the informal sector should be encouraged to keep records of their transactions to prevent losses and miscalculations.…”
Get full text
Thesis -
1296
Information and Communication Technology on the Performance of SACCOs: A Case Study of Kebison SACCO in Kebisoni Town Council Rukungiri District.
Published 2025“…The study recommended that SACCOs should offer online services to make it easier for members to engage with the SACCO, leading to increased transactions and sales growth and there should be efficient data management to improve decision-making, reduce errors, and enhance the overall operational efficiency, contributing to increased profitability.…”
Get full text
Thesis -
1297
Cash transfer, maternal and child health outcomes: a scoping review in sub-Saharan Africa
Published 2024-12-01“…Across all categories of reported measures, evidence emerges that cash transfer programmes improved some health outcomes (e.g. improved infant and child survival, reduced incidence of illnesses, improved cognitive and motor development, improved general health, delayed sexual debut, lower transactional sex, etc.), while in some of the studies, outcomes such as depression did not show significant improvements. …”
Get full text
Article -
1298
Rancang Bangun Electronic Customer Relationship Management pada Sistem Informasi Hotel dengan Framework of Dynamic CRM
Published 2020-02-01“…While at the retention stage, individual customers get a 5% discount and company customers get a free service if they have made a room booking transaction more than five times. …”
Get full text
Article -
1299
Detecting anomalies in graph networks on digital markets.
Published 2024-01-01“…In the former, an anomaly is defined as a bot, as opposed to a human user, whereas in the latter, an anomaly is a user who conducted a fraudulent transaction, which may (but does not have to) imply being a bot. …”
Get full text
Article -
1300
Image Enhancement of Cross-Border E-Commerce Logistics Video Surveillance Based on Partial Differential Equations
Published 2021-01-01“…Although the development time of cross-border e-commerce in China is very short, the scale of its transactions and the speed of development are amazing, and as a supporting foundation for promoting economic and trade globalization, cross-border e-commerce has an extremely important strategy for this guiding role. …”
Get full text
Article