3 research outputs found

    Trust Evolution Game in Blockchain

    Get PDF
    One of the main concepts behind Blockchain is trustlessness, where trust is shifted to a new paradigm through Cryptoeconomics. But how can people trust a trustless system? Blockchain protocols employ incentive structures predicated on game theory mechanisms in order to encourage the players (users and miners) in the system to act honestly. Users don\u27t need to trust any single entity and there is no single point of failure that the system relies on(trustless system). In this paper, we developed an abstract game model for blockchain. The game model was for a repeated matrix game to be played by blockchain users. We studied how the game design enforces players to cooperate with each other to benefit the whole players in the network, which increase trust and make the system more trustworthy. Also, we applied two basic learning algorithms to see how the players of the game will evolve over time. We found that the players learn to cooperate in the game to get better payoffs

    Artificial Intelligence Applications in Cybersecurity

    Get PDF
    For the past decades, cyber threats have been increasing significantly and are designed in a sophisticated way that is tough to detect using traditional protection tools. As a result, privacy and sensitive personal information such as credit card numbers are being continuously compromised. Therefore, it is time to find a solution that can stand against the spreading of such threats. Artificial intelligence, machine learning, and deep learning could be among the top methods of detecting cyber threats. These methods could help to improve the detection technologies and engines for computer network defense. This chapter mainly focuses on artificial intelligence in cybersecurity. The main goal of this chapter is to highlight the drawbacks of the traditional security protection tools and discuss the improvements that has been made so far by applying artificial intelligence to solve the current cybersecurity problems

    NFT Certificates and Proof of Delivery for Fine Jewelry and Gemstones

    Get PDF
    Fine jewelry is a unique class of ornaments composed of precious metals and gemstones. Premium-grade metals such as gold, platinum, and sliver, and gemstones such as pearls, diamonds, rubies, and emeralds are used use to make fine jewelry. Paper-based certificates are typically issued by retailers and producers for fine jewelry and gemstones as a proof of origin, sale, ownership, history, and quality. However, paper certificates are subject to counterfeiting, loss, or theft. In this paper, we show how non-fungible tokens (NFTs) and Ethereum blockchain can be used for digital certification, proof of ownership, sale history, and quality, as well as proof of delivery for fine jewelry and gemstones.We present the proposed system design and architecture with sequence diagrams covering key interactions for jewelry production, purchase, and sale, along with algorithms related to NFT minting, auctioning, ownership management, and physical delivery. We demonstrate that our proposed NFT and blockchain-based solution can provide superior alternative in terms of verifiability, traceability, immutability, and security when compared with paper-based certification and traditional auctioning, delivery and ownership management. We make our developed smart contracts and testing scripts publicly available on GitHub
    corecore