- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Peer-to-Peer Network Technologies
- Cloud Data Security Solutions
- Cryptography and Data Security
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Simulation Techniques and Applications
- Distributed and Parallel Computing Systems
- FinTech, Crowdfunding, Digital Finance
Macao Polytechnic University
2023
University of Bologna
2022
Blockchain exposes all users' transaction data to the public, including account balances, asset holdings, trading history, etc. Such exposure leads potential security and personal privacy risks that restrict blockchain from broader adoption. Although some existing projects focus on single-chain confidential payment, no cross-chain system supports private transactions yet, which is incompatible with regulations such as GDPR. Also, current payment systems require users pay high extra fees....
The Internet Computer Protocol is a new generation blockchain that aims to provide better security and scalability than the traditional solutions. In this paper, innovative distributed computing architecture introduced, modeled then simulated by means of an agent-based simulation. result digital twin current Computer, be exploited drive future design development optimizations, investigate its performance, evaluate resilience system some attacks. Preliminary performance measurements on...
This article explores the feasibility of developing cloud storage dApps on Internet Computer (IC) blockchain, which can hold full-stack applications entirely on-chain and run at web speed. We analyze services' security, stability, cost, performance issues propose a multi-canister system design scheme for building IC. Our quantitative tests demonstrate that blockchain-secured data I/O operations IC result in ten times time savings up to million cost compared those Ethereum; deploying...
A well-known use of the blockchain technology is Decentralized Finance (DeFi). DeFi makes financial information accessible to public but raises potential privacy and security issues. In this study, we implemented a protocol that protects privacy, which based on Mystiko.Network protocol. As proxy between user platforms, offers an auditable confidentiality mechanism for transactions. Via new system, users may submit anonymous transactions get income back into shielded tokens pool. Moreover,...