What is the block chain?
In this paper, we examine the Chinese block technology. First, we will define block Chain, and then discuss how the block chain provides access to a large decentralized office so that there is no possibility of achieving it anymore. Furthermore, we will discuss the two technologies used in block chain, encryption keys and distributed network, as well as the problem of the confidence of transactions. We show that each member uses one of the consensus algorithms to update the data and explain the types of consensus algorithms, each containing the advantages and disadvantages.
[David 2016] David L. K. :Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data, Academic Press., pp. 47–51. ISBN 978-0-12-802117-0., ScienceDirect, 2016.
[Ron 2012] Ron D. and Shamir A.:Quantitative analysis of the full Bitcoin transaction graph, in Proc. Int. Conf. Financial Cryptography and Data, 2012.
[Pinyaphat 2018] Pinyaphat T.: Blockchain: Challenges and Applications, International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 2018.
[Kotobi 2015] Kotobi k., Mainwaring P. B., Tucker C. S. and Bilén S. G.: Data through put enhancement using data mining–informed cognitive radio, Electronics, vol. 4, pp. 221–238, Mar. 2015.
[Kotobi 2018] Kotobi k. and Bilen S. G.: Secure Blockchains for Dynamic Spectrum Access : A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access, IEEE Vehicular Technology Magazine , 2018.
[Lal 2003] Lal S. and Mishra A.: A look ahead scheme for adaptive spectrum utilization, in Proc. Radio and Wireless Conf. (RAWCON ’03), pp. 83–86, 2003.
[Shukla 2006] Shukla, Alptekin A., Bradford J., Burbidge E., Chandler D., Kennett M., Levine P., and Weiss S.: Cognitive radio technology: A study for OFCOM, QinetiQ Ltd., Cody Technology Park, Farnborough, Hampshire, U.K., Tech. Rep. 830000143, 2006.
[Marko 2017] Markov V.: The Quest for Scalable Blockchain Fabric:Proof-of-Work, IBM Research, Zurich, Switzerland, 2017.
[Gervais 2016] Gervais A., Karame G.O., Wüst K., Glykantzis V., Ritzdorf H., Capkun S.: On the security and performance of proof of work blockchains, The ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16, 2016.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).