Topic

blockchain

Collection size
250 articles
Page 3 of 13
JD Tech Talk
JD Tech Talk
Jul 7, 2020 · Artificial Intelligence

Federated Learning vs. Blockchain: Status, Rationale, Comparison, and Complementarity

This article examines the current status, strategic importance, and underlying reasons for federated learning and blockchain, compares their similarities and differences, and explores how their complementary strengths can be combined to create trusted, privacy‑preserving, and value‑transfer solutions in the digital economy.

AIFederated Learningblockchain
0 likes · 10 min read
Federated Learning vs. Blockchain: Status, Rationale, Comparison, and Complementarity
JD Tech Talk
JD Tech Talk
Mar 3, 2020 · Blockchain

China's Central Bank Issues the First Financial Industry Blockchain Standard (JR/T 0184‑2020)

The People's Bank of China has published the JR/T 0184‑2020 Financial Distributed Ledger Technology Security Specification, the country's first blockchain‑related standard for the financial sector, with JD Digital Technology playing a key drafting role and industry experts predicting it will steer the sector away from chaotic growth.

ChinaFinTechJD Digital
0 likes · 8 min read
China's Central Bank Issues the First Financial Industry Blockchain Standard (JR/T 0184‑2020)
JD Tech Talk
JD Tech Talk
Nov 20, 2019 · Blockchain

JD.com’s “ZhiZhen Chain” Blockchain Platform: Technology Overview and Industry Applications

The article presents JD.com’s ZhiZhen Chain blockchain platform, detailing its open‑source JD Chain engine, component‑based architecture, high‑throughput performance, cryptographic innovations, BaaS services, and real‑world applications in supply‑chain traceability, digital evidence, asset‑backed securities, and digital finance, highlighting extensive deployment statistics and future innovation directions.

BaaSDigital financeJD Chain
0 likes · 8 min read
JD.com’s “ZhiZhen Chain” Blockchain Platform: Technology Overview and Industry Applications
JD Tech Talk
JD Tech Talk
Nov 14, 2019 · Blockchain

Exploration and Outlook of Next-Generation Blockchain – Full Speech by JD Chain Chief Architect

In this speech, JD Chain chief architect Huang Haiquan discusses three core blockchain questions, JD's blockchain architecture and practice, and introduces the JD Chain open-source project, highlighting use cases such as vaccine traceability and outlining the evolution of next‑generation blockchain architecture.

JD ChainUse Casesarchitecture
0 likes · 9 min read
Exploration and Outlook of Next-Generation Blockchain – Full Speech by JD Chain Chief Architect
JD Tech Talk
JD Tech Talk
Jun 4, 2019 · Blockchain

JD Chain: JD Digital Technology’s Open‑Source Blockchain Engine Overview

JD Chain, JD Digital Technology’s open‑source blockchain engine announced in 2019, offers enterprise‑grade features such as modular cryptographic algorithms, pluggable consensus protocols, key‑value ledger model, flexible storage, and comprehensive APIs, aiming to accelerate blockchain adoption across diverse business scenarios.

APIConsensusblockchain
0 likes · 7 min read
JD Chain: JD Digital Technology’s Open‑Source Blockchain Engine Overview
JD Tech Talk
JD Tech Talk
Aug 28, 2018 · Blockchain

Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)

The article analyses the shortcomings of traditional seller‑driven financial risk data queries and proposes a blockchain consortium that uses distributed ledger, consensus, smart contracts and token‑based pricing to enable fair, secure, and efficient data sharing and settlement among financial institutions.

Financial Data SharingHyperledger Fabricblockchain
0 likes · 14 min read
Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)
360 Tech Engineering
360 Tech Engineering
Jan 23, 2019 · Blockchain

An Introduction to Blockchain, Bitcoin, Ethereum, and ICOs

This article provides a comprehensive overview of blockchain technology, explaining its structure, cryptographic foundations, and how Bitcoin and Ethereum operate, including mining, transaction processes, smart contracts, and ICOs, while also highlighting regulatory concerns and common misconceptions.

BitcoinCryptocurrencyEthereum
0 likes · 9 min read
An Introduction to Blockchain, Bitcoin, Ethereum, and ICOs
360 Tech Engineering
360 Tech Engineering
Nov 21, 2018 · Blockchain

Double-Spend Attacks on Major Public Blockchains: Vulnerabilities and Mitigation

This article surveys multiple double‑spend attack vectors discovered on major public blockchains such as Bitcoin, EOS, and NEO, classifies them into verification flaws, VM execution inconsistencies, and consensus weaknesses, and proposes an efficient mitigation method based on write‑operation hashing.

ConsensusDouble SpendEOS
0 likes · 22 min read
Double-Spend Attacks on Major Public Blockchains: Vulnerabilities and Mitigation
360 Tech Engineering
360 Tech Engineering
Nov 8, 2018 · Blockchain

Key Management Standards for Bitcoin Wallets

This article explains the fundamentals of Bitcoin wallet key management, covering the relationships between private keys, public keys, and addresses, the different wallet types, and the essential BIP standards (BIP‑0032, BIP‑0039, BIP‑0043, BIP‑0044) that define deterministic key derivation and mnemonic generation.

BIPHD-walletblockchain
0 likes · 14 min read
Key Management Standards for Bitcoin Wallets
360 Smart Cloud
360 Smart Cloud
Feb 25, 2021 · Blockchain

Polkadot Overview: Architecture, Relay Chain, Parachains, Transaction Lifecycle, and NPoS Mechanism

This article provides a comprehensive overview of Polkadot, explaining its relay‑chain and parachain architecture, cross‑chain interoperability goals, detailed transaction lifecycle across five stages, the nominated proof‑of‑stake (NPoS) consensus mechanism, and the growing ecosystem of applications built on the platform.

ConsensusCross-chainNPoS
0 likes · 11 min read
Polkadot Overview: Architecture, Relay Chain, Parachains, Transaction Lifecycle, and NPoS Mechanism
360 Smart Cloud
360 Smart Cloud
Nov 21, 2019 · Blockchain

Ethereum RPC Attack Methods and Defense Recommendations

This article outlines multiple Ethereum RPC attack techniques—including unlock‑account hijacking, miner‑address manipulation, brute‑force, offline, and zero‑fee attacks—provides detailed attack flow diagrams, code‑path references, recent honeypot statistics, and practical defense measures to secure RPC endpoints.

AttackEthereumRPC
0 likes · 8 min read
Ethereum RPC Attack Methods and Defense Recommendations
Qunar Tech Salon
Qunar Tech Salon
Mar 14, 2018 · Blockchain

Understanding Bitcoin Architecture: Decentralization, Ledger Design, and Consensus Mechanisms

This article explains how Bitcoin implements a decentralized electronic currency system by combining P2P networking, blockchain ledger structures, cryptographic signatures, proof‑of‑work consensus, and final consistency to achieve secure, tamper‑resistant storage and transaction processing.

BitcoinConsensusDistributed Storage
0 likes · 16 min read
Understanding Bitcoin Architecture: Decentralization, Ledger Design, and Consensus Mechanisms
Hujiang Technology
Hujiang Technology
Apr 16, 2018 · Blockchain

Implementing a Weighted Voting DApp with ERC20 Tokens on Ethereum

This article guides developers through extending a simple Ethereum voting DApp by introducing ERC20 token-based weighted voting, covering token concepts, Solidity contract design with structs and mappings, functions for buying tokens, voting, and fund transfer, as well as deployment, testing, and front‑end integration steps.

DAppERC20Ethereum
0 likes · 16 min read
Implementing a Weighted Voting DApp with ERC20 Tokens on Ethereum
Cognitive Technology Team
Cognitive Technology Team
Oct 27, 2024 · Blockchain

What Is Blockchain? Core Concepts and Fundamentals

This article explains blockchain by distinguishing its narrow definition as a cryptographically linked data structure from its broader view as a decentralized infrastructure, and then details blocks, headers, bodies, hash functions, chain structure, Merkle trees, timestamps, asymmetric encryption, P2P networking, data propagation, and validation mechanisms.

ConsensusMerkle treeblockchain
0 likes · 11 min read
What Is Blockchain? Core Concepts and Fundamentals
AntTech
AntTech
Mar 28, 2024 · Information Security

Web3 Phishing Attacks: Methods, Risks, and Countermeasures

This article examines the rapid rise of Web3 phishing, detailing various attack vectors such as transaction‑based phishing, eth_sign blind signing, modal phishing, approval abuse, address‑poisoning, and zero‑transfer tricks, while presenting detection methods and Ant Group’s multi‑dimensional anti‑money‑laundering platform as a countermeasure.

Web3blockchainphishing
0 likes · 16 min read
Web3 Phishing Attacks: Methods, Risks, and Countermeasures
AntTech
AntTech
Dec 14, 2023 · Big Data

Ant Group’s ‘YinYu’ Privacy‑Computing Framework Enables Joint Pricing for New‑Energy Vehicle Insurance

Ant Group’s industrial‑grade ‘YinYu’ privacy‑computing framework, recognized in China’s 2023 Big Data “Star River” case list, powers a joint‑pricing insurance platform that securely integrates AI, big‑data analytics and blockchain to improve new‑energy vehicle insurance pricing, reduce premiums and enhance risk assessment.

AIActuarial PricingInsurance
0 likes · 5 min read
Ant Group’s ‘YinYu’ Privacy‑Computing Framework Enables Joint Pricing for New‑Energy Vehicle Insurance
AntTech
AntTech
Oct 20, 2023 · Information Security

Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification

The article describes how Ant Group and partners created an accessible online movie platform for visually impaired users in China, employing innovative privacy‑computing, blockchain, and terminal‑security technologies to enable secure, minimal‑disclosure identity verification and protect intellectual‑property rights.

accessible mediablockchaindigital accessibility
0 likes · 6 min read
Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification
AntTech
AntTech
Jul 3, 2023 · Blockchain

Flashbots MEV Bot Attack on Ethereum: Vulnerability Analysis, Exploit Timeline, and Mitigation

This article provides a detailed forensic analysis of a Flashbots MEV bot attack on Ethereum, describing the underlying PBS protocol flaw, the malicious validator’s multi‑stage preparation, the sandwich‑style exploit, the financial impact, and recommended code‑level fixes to prevent private transaction leakage.

EthereumFlashbotsMEV
0 likes · 13 min read
Flashbots MEV Bot Attack on Ethereum: Vulnerability Analysis, Exploit Timeline, and Mitigation