Cryptocurrency is a digital version of currency that uses cryptographic technologies to guarantee the security of transactions. In recent years, cryptocurrencies such as Bitcoin and Ether are increasingly popular, including among cybercriminals (e.g. in ransomware cases). Blockchain underpins many of the existing cryptocurrencies, and plays an extremely important role due to its many desirable properties (e.g. transaction distribution and decentralized consensus). Applications of blockchain include identity management, smart contract, e-health, and many others are emerging. Currently, the daily cryptocurrency trading volume reportedly exceeds USD 1 billion.
Similar to other technologies, ensuring privacy and accountability is important. For example, how to balance privacy, accountability, and security in blockchain and cryptocurrency is a challenging problem, and one that we focus on in this special issue.
This special issue aims to publish state-of-the-art research advances in accountability, security and privacy topics relating to blockchain and cryptocurrency, with emphasis on the following aspects:
Accountability in Blockchain and Cryptocurrency
Anonymity in Blockchain and Cryptocurrency
Application of Blockchain
Auditing in Blockchain and Cryptocurrency
Bitcoin & Altcoins
Distributed Ledger Technology
Integrity in Blockchain and Cryptocurrency
Scalability of Blockchain and Cryptocurrency
Legal and Regulation Issues in Blockchain and Cryptocurrency
Submission Due: December 31st 2017
First Round Notification: February 28th 2018
Revision: March 31st 2018
Final Notification (expected): May 15th 2018
Authors should prepare their manuscript according to the Guide for Authors available from the online submission page of the FGCS at http://www.evise.com/evise/jrnl/fgcs. Authors must select \”SI: APBC\” when they reach the \”Article Type\” step in the submission process. All papers will be peer-reviewed following the FGCS reviewing procedures.
Sherman S.M. Chow, E-mail: [email protected]
Department of Information Engineering, Chinese University of Hong Kong, Hong Kong
Jinguang Han, E-mail: [email protected]
Department of Computer Science, University of Surrey, UK
Kim-Kwang Raymond Choo, E-mail: [email protected]
Department of Information Systems and Cyber Security, University of Texas at San Antonio, USA