Search Articles

View query in Help articles search

Search Results (1 to 2 of 2 Results)

Download search results: CSV END BibTex RIS


Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept

Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept

The consensus protocol incorporates sender authenticity via public key cryptography, game theory and cryptoeconomic (digital currency) incentives, and computational complexity to ensure that honest nodes are rewarded, and dishonest nodes are penalized to maintain the canonical truth. By making each transaction auditable and permissionless, public blockchains ensure data integrity, trust, and verifiability.

Michael Jones, Matthew Johnson, Mark Shervey, Joel T Dudley, Noah Zimmerman

J Med Internet Res 2019;21(8):e13600