A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2303.13727
Federated Learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence along with emerging security and privacy threats. FL enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While this paradigm partly mitigates the privacy issues of users' sensitive data, the performance of the FL process can be threatened and reached a bottleneck due to the growing cyber threats and privacy violation techniques. To expedite the proliferation of FL process, the integration of blockchain for FL environments has drawn prolific attention from the people of academia and industry. Blockchain has the potential to prevent security and privacy threats with its decentralization, immutability, consensus, and transparency characteristic. However, if the blockchain mechanism requires costly computational resources, then the resource-constrained FL clients cannot be involved in the training. Considering that, this survey focuses on reviewing the challenges, solutions, and future directions for the successful deployment of blockchain in resource-constrained FL environments. We comprehensively review variant blockchain mechanisms that are suitable for FL process and discuss their trade-offs for a limited resource budget. Further, we extensively analyze the cyber threats that could be observed in a resource-constrained FL environment, and how blockchain can play a key role to block those cyber attacks. To this end, we highlight some potential solutions towards the coupling of blockchain and federated learning that can offer high levels of reliability, data privacy, and distributed computing performance.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2303.13727
- https://arxiv.org/pdf/2303.13727
- OA Status
- green
- Cited By
- 2
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4361191951
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4361191951Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2303.13727Digital Object Identifier
- Title
-
A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained ComputingWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-03-24Full publication date if available
- Authors
-
Ervin Moore, Ahmed Imteaj, Shabnam Rezapour, M. Hadi AminiList of authors in order
- Landing page
-
https://arxiv.org/abs/2303.13727Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2303.13727Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2303.13727Direct OA link when available
- Concepts
-
Blockchain, Computer science, Decentralization, Bottleneck, Computer security, Transparency (behavior), Popularity, Cryptocurrency, Information privacy, Resource (disambiguation), Computer network, Political science, Embedded system, Law, Psychology, Social psychologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4361191951 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2303.13727 |
| ids.doi | https://doi.org/10.48550/arxiv.2303.13727 |
| ids.openalex | https://openalex.org/W4361191951 |
| fwci | |
| type | preprint |
| title | A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10764 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Privacy-Preserving Technologies in Data |
| topics[1].id | https://openalex.org/T10237 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9901999831199646 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptography and Data Security |
| topics[2].id | https://openalex.org/T11612 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9883000254631042 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Stochastic Gradient Optimization Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2779687700 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8761087656021118 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q20514253 |
| concepts[0].display_name | Blockchain |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7027894854545593 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C136810230 |
| concepts[2].level | 2 |
| concepts[2].score | 0.616295337677002 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q188961 |
| concepts[2].display_name | Decentralization |
| concepts[3].id | https://openalex.org/C2780513914 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6057876348495483 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q18210350 |
| concepts[3].display_name | Bottleneck |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5618696808815002 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C2780233690 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4949466586112976 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q535347 |
| concepts[5].display_name | Transparency (behavior) |
| concepts[6].id | https://openalex.org/C2780586970 |
| concepts[6].level | 2 |
| concepts[6].score | 0.483180433511734 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1357284 |
| concepts[6].display_name | Popularity |
| concepts[7].id | https://openalex.org/C180706569 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4576302170753479 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q13479982 |
| concepts[7].display_name | Cryptocurrency |
| concepts[8].id | https://openalex.org/C123201435 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4523412585258484 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q456632 |
| concepts[8].display_name | Information privacy |
| concepts[9].id | https://openalex.org/C206345919 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4145861268043518 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q20380951 |
| concepts[9].display_name | Resource (disambiguation) |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| concepts[11].id | https://openalex.org/C17744445 |
| concepts[11].level | 0 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[11].display_name | Political science |
| concepts[12].id | https://openalex.org/C149635348 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[12].display_name | Embedded system |
| concepts[13].id | https://openalex.org/C199539241 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[13].display_name | Law |
| concepts[14].id | https://openalex.org/C15744967 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[14].display_name | Psychology |
| concepts[15].id | https://openalex.org/C77805123 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q161272 |
| concepts[15].display_name | Social psychology |
| keywords[0].id | https://openalex.org/keywords/blockchain |
| keywords[0].score | 0.8761087656021118 |
| keywords[0].display_name | Blockchain |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7027894854545593 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/decentralization |
| keywords[2].score | 0.616295337677002 |
| keywords[2].display_name | Decentralization |
| keywords[3].id | https://openalex.org/keywords/bottleneck |
| keywords[3].score | 0.6057876348495483 |
| keywords[3].display_name | Bottleneck |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.5618696808815002 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/transparency |
| keywords[5].score | 0.4949466586112976 |
| keywords[5].display_name | Transparency (behavior) |
| keywords[6].id | https://openalex.org/keywords/popularity |
| keywords[6].score | 0.483180433511734 |
| keywords[6].display_name | Popularity |
| keywords[7].id | https://openalex.org/keywords/cryptocurrency |
| keywords[7].score | 0.4576302170753479 |
| keywords[7].display_name | Cryptocurrency |
| keywords[8].id | https://openalex.org/keywords/information-privacy |
| keywords[8].score | 0.4523412585258484 |
| keywords[8].display_name | Information privacy |
| keywords[9].id | https://openalex.org/keywords/resource |
| keywords[9].score | 0.4145861268043518 |
| keywords[9].display_name | Resource (disambiguation) |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2303.13727 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://arxiv.org/pdf/2303.13727 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2303.13727 |
| locations[1].id | doi:10.48550/arxiv.2303.13727 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2303.13727 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5065701515 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Ervin Moore |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Moore, Ervin |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5077711449 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6975-3997 |
| authorships[1].author.display_name | Ahmed Imteaj |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Imteaj, Ahmed |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5079605496 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6071-4086 |
| authorships[2].author.display_name | Shabnam Rezapour |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Rezapour, Shabnam |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5080895872 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | M. Hadi Amini |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Amini, M. Hadi |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2303.13727 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-03-31T00:00:00 |
| display_name | A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10764 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Privacy-Preserving Technologies in Data |
| related_works | https://openalex.org/W4210406818, https://openalex.org/W4306779889, https://openalex.org/W4386732777, https://openalex.org/W3211706803, https://openalex.org/W4382775358, https://openalex.org/W4246942721, https://openalex.org/W3209862047, https://openalex.org/W4304136894, https://openalex.org/W2989851257, https://openalex.org/W4303984095 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2303.13727 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2303.13727 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2303.13727 |
| primary_location.id | pmh:oai:arXiv.org:2303.13727 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://arxiv.org/pdf/2303.13727 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2303.13727 |
| publication_date | 2023-03-24 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 73, 188, 204, 213 |
| abstract_inverted_index.FL | 29, 66, 90, 97, 140, 169, 181, 206 |
| abstract_inverted_index.To | 85, 221 |
| abstract_inverted_index.We | 171 |
| abstract_inverted_index.be | 69, 143, 201 |
| abstract_inverted_index.if | 129 |
| abstract_inverted_index.in | 7, 145, 167, 203 |
| abstract_inverted_index.of | 15, 38, 58, 64, 89, 94, 106, 165, 232, 242 |
| abstract_inverted_index.on | 153 |
| abstract_inverted_index.to | 11, 47, 76, 114, 216 |
| abstract_inverted_index.we | 193, 224 |
| abstract_inverted_index.and | 19, 26, 71, 81, 108, 117, 125, 158, 183, 208, 234, 246 |
| abstract_inverted_index.any | 48 |
| abstract_inverted_index.are | 178 |
| abstract_inverted_index.can | 68, 211, 238 |
| abstract_inverted_index.due | 10, 75 |
| abstract_inverted_index.for | 96, 161, 180, 187 |
| abstract_inverted_index.has | 3, 99, 111 |
| abstract_inverted_index.how | 209 |
| abstract_inverted_index.its | 121 |
| abstract_inverted_index.key | 214 |
| abstract_inverted_index.the | 12, 39, 44, 55, 62, 65, 77, 87, 92, 104, 112, 130, 138, 146, 155, 162, 196, 230 |
| abstract_inverted_index.(FL) | 2 |
| abstract_inverted_index.data | 36, 46, 244 |
| abstract_inverted_index.edge | 40 |
| abstract_inverted_index.end, | 223 |
| abstract_inverted_index.fast | 13 |
| abstract_inverted_index.from | 34, 103 |
| abstract_inverted_index.high | 240 |
| abstract_inverted_index.play | 212 |
| abstract_inverted_index.role | 215 |
| abstract_inverted_index.some | 226 |
| abstract_inverted_index.that | 177, 199, 237 |
| abstract_inverted_index.then | 137 |
| abstract_inverted_index.this | 51, 150, 222 |
| abstract_inverted_index.with | 23, 120 |
| abstract_inverted_index.While | 50 |
| abstract_inverted_index.along | 22 |
| abstract_inverted_index.block | 217 |
| abstract_inverted_index.could | 200 |
| abstract_inverted_index.cyber | 79, 197, 219 |
| abstract_inverted_index.data, | 61 |
| abstract_inverted_index.drawn | 100 |
| abstract_inverted_index.local | 35 |
| abstract_inverted_index.model | 32 |
| abstract_inverted_index.offer | 239 |
| abstract_inverted_index.that, | 149 |
| abstract_inverted_index.their | 185 |
| abstract_inverted_index.those | 218 |
| abstract_inverted_index.years | 9 |
| abstract_inverted_index.cannot | 142 |
| abstract_inverted_index.costly | 134 |
| abstract_inverted_index.future | 159 |
| abstract_inverted_index.gained | 4 |
| abstract_inverted_index.issues | 57 |
| abstract_inverted_index.levels | 241 |
| abstract_inverted_index.partly | 53 |
| abstract_inverted_index.people | 105 |
| abstract_inverted_index.recent | 8 |
| abstract_inverted_index.review | 173 |
| abstract_inverted_index.survey | 151 |
| abstract_inverted_index.users' | 59 |
| abstract_inverted_index.analyze | 195 |
| abstract_inverted_index.booming | 14 |
| abstract_inverted_index.budget. | 191 |
| abstract_inverted_index.clients | 141 |
| abstract_inverted_index.devices | 41 |
| abstract_inverted_index.discuss | 184 |
| abstract_inverted_index.enables | 30 |
| abstract_inverted_index.focuses | 152 |
| abstract_inverted_index.growing | 78 |
| abstract_inverted_index.limited | 189 |
| abstract_inverted_index.machine | 17 |
| abstract_inverted_index.prevent | 115 |
| abstract_inverted_index.privacy | 27, 56, 82, 118 |
| abstract_inverted_index.process | 67, 182 |
| abstract_inverted_index.reached | 72 |
| abstract_inverted_index.storage | 37 |
| abstract_inverted_index.threats | 80, 119, 198 |
| abstract_inverted_index.towards | 229 |
| abstract_inverted_index.variant | 174 |
| abstract_inverted_index.without | 42 |
| abstract_inverted_index.Further, | 192 |
| abstract_inverted_index.However, | 128 |
| abstract_inverted_index.Learning | 1 |
| abstract_inverted_index.academia | 107 |
| abstract_inverted_index.advanced | 16 |
| abstract_inverted_index.attacks. | 220 |
| abstract_inverted_index.coupling | 231 |
| abstract_inverted_index.emerging | 24 |
| abstract_inverted_index.expedite | 86 |
| abstract_inverted_index.involved | 144 |
| abstract_inverted_index.learning | 18, 236 |
| abstract_inverted_index.observed | 202 |
| abstract_inverted_index.paradigm | 52 |
| abstract_inverted_index.privacy, | 245 |
| abstract_inverted_index.process, | 91 |
| abstract_inverted_index.prolific | 101 |
| abstract_inverted_index.requires | 133 |
| abstract_inverted_index.resource | 190 |
| abstract_inverted_index.security | 25, 116 |
| abstract_inverted_index.suitable | 179 |
| abstract_inverted_index.threats. | 28 |
| abstract_inverted_index.Federated | 0 |
| abstract_inverted_index.attention | 102 |
| abstract_inverted_index.computing | 248 |
| abstract_inverted_index.efficient | 31 |
| abstract_inverted_index.entities. | 49 |
| abstract_inverted_index.federated | 235 |
| abstract_inverted_index.highlight | 225 |
| abstract_inverted_index.industry. | 109 |
| abstract_inverted_index.mechanism | 132 |
| abstract_inverted_index.mitigates | 54 |
| abstract_inverted_index.potential | 113, 227 |
| abstract_inverted_index.revealing | 43 |
| abstract_inverted_index.reviewing | 154 |
| abstract_inverted_index.sensitive | 45, 60 |
| abstract_inverted_index.solutions | 228 |
| abstract_inverted_index.training. | 147 |
| abstract_inverted_index.violation | 83 |
| abstract_inverted_index.Blockchain | 110 |
| abstract_inverted_index.artificial | 20 |
| abstract_inverted_index.blockchain | 95, 131, 166, 175, 210, 233 |
| abstract_inverted_index.bottleneck | 74 |
| abstract_inverted_index.consensus, | 124 |
| abstract_inverted_index.deployment | 164 |
| abstract_inverted_index.directions | 160 |
| abstract_inverted_index.generation | 33 |
| abstract_inverted_index.mechanisms | 176 |
| abstract_inverted_index.popularity | 6 |
| abstract_inverted_index.resources, | 136 |
| abstract_inverted_index.solutions, | 157 |
| abstract_inverted_index.successful | 163 |
| abstract_inverted_index.threatened | 70 |
| abstract_inverted_index.trade-offs | 186 |
| abstract_inverted_index.widespread | 5 |
| abstract_inverted_index.Considering | 148 |
| abstract_inverted_index.challenges, | 156 |
| abstract_inverted_index.distributed | 247 |
| abstract_inverted_index.extensively | 194 |
| abstract_inverted_index.integration | 93 |
| abstract_inverted_index.performance | 63 |
| abstract_inverted_index.techniques. | 84 |
| abstract_inverted_index.environment, | 207 |
| abstract_inverted_index.environments | 98 |
| abstract_inverted_index.intelligence | 21 |
| abstract_inverted_index.performance. | 249 |
| abstract_inverted_index.reliability, | 243 |
| abstract_inverted_index.transparency | 126 |
| abstract_inverted_index.computational | 135 |
| abstract_inverted_index.environments. | 170 |
| abstract_inverted_index.immutability, | 123 |
| abstract_inverted_index.proliferation | 88 |
| abstract_inverted_index.characteristic. | 127 |
| abstract_inverted_index.comprehensively | 172 |
| abstract_inverted_index.decentralization, | 122 |
| abstract_inverted_index.resource-constrained | 139, 168, 205 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |