{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:15Z","timestamp":1777951875979,"version":"3.51.4"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.098","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"855-866","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Quantum-Resistant Blockchain Protocol for Secure Smart Contracts in Cross-Border Finance"],"prefix":"10.1016","volume":"275","author":[{"given":"Doaa I.","family":"Hasan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mustafa Hamid","family":"Abd Alsadh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hayder Makki","family":"Shakir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hamsa Emad","family":"Mahmood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amjed Abbas","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marwan","family":"Abdeldayem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nuha Jameel","family":"Ibrahim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.098_bib1","doi-asserted-by":"crossref","unstructured":"K. P. Sharma et al., \u201cBlockchain-Assisted Trust Framework for Increased Survivability in Internet of Vehicles,\u201d Internet Technology Letters, vol. 8, no. 3, 2025, doi: 10.1002\/itl2.70029.","DOI":"10.1002\/itl2.70029"},{"key":"10.1016\/j.procs.2026.01.098_bib2","unstructured":"D. Soataliyev and N. Khandelwal, \u201cLeveraging Blockchain-Backed Cloud Solutions for Secure, Compliant, and Optimized Remote Workforce Management,\u201d 2023."},{"key":"10.1016\/j.procs.2026.01.098_bib3","doi-asserted-by":"crossref","unstructured":"P. Chanda and P. Singh, \u201c Enhancing Hr Onboarding Procedures: A Blockchain-Powered Pbft Consensus Approach,\u201d 2023.","DOI":"10.2139\/ssrn.4567950"},{"issue":"4","key":"10.1016\/j.procs.2026.01.098_bib4","first-page":"1","article-title":"\u201cUntangling blockchain: A data processing view of blockchain systems,\u201d","volume":"2","author":"Dinh","year":"2025","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.procs.2026.01.098_bib5","unstructured":"T. Dinh, R. Liu, and M. Zhang, \u201cUntangling blockchain: A data processing view of blockchain systems,\u201d IEEE Trans Knowl Data Eng, 2025."},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib6","first-page":"2","article-title":"\u201cDecentralized peer-to-peer energy trading: A blockchain-enabled approach,\u201d","volume":"3","author":"Wang","year":"2025","journal-title":"Energy Informatics"},{"issue":"2","key":"10.1016\/j.procs.2026.01.098_bib7","first-page":"1","article-title":"\u201cBlockchain-Enabled Intrusion Detection and Load Forecasting in Electrical Transmission Systems,\u201d","volume":"7","author":"Kumar","year":"2024","journal-title":"Journal of Advances in Computational Intelligence Theory"},{"issue":"10","key":"10.1016\/j.procs.2026.01.098_bib8","doi-asserted-by":"crossref","first-page":"e31592","DOI":"10.1016\/j.heliyon.2024.e31592","article-title":"\u201cBlockchain-powered grids: Paving the way for a sustainable and efficient future,\u201d","volume":"10","author":"Ullah","year":"2024","journal-title":"Heliyon"},{"key":"10.1016\/j.procs.2026.01.098_bib9","doi-asserted-by":"crossref","unstructured":"S. Dos Santos and J. Singh, \u201cA new era of blockchain-powered decentralized finance (DeFi)-a review,\u201d In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 1286\u20131292, 2022.","DOI":"10.1109\/COMPSAC54236.2022.00203"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib10","first-page":"403","article-title":"\u201cSecurity and privacy issues in smart grid and renewable energy: Blockchain-enabled solutions.,\u201d","volume":"124","author":"Gai","year":"2021","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.1016\/j.procs.2026.01.098_bib11","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1109\/TCSS.2023.3268592","article-title":"\u201cBlockchain-enabled intelligent iot protocol for high-performance and secured big financial data transaction,\u201d","volume":"11","author":"Saba","year":"2023","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"10.1016\/j.procs.2026.01.098_bib12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.eij.2022.06.007","article-title":"\u201cPrivate blockchain-based encryption framework using computational intelligence approach,\u201d","volume":"23","author":"Ghazal","year":"2022","journal-title":"Egyptian Informatics Journal"},{"issue":"10","key":"10.1016\/j.procs.2026.01.098_bib13","first-page":"1","article-title":"\u201cBlockchain-Based Digital Asset Circulation: A Survey and Future Challenges,\u201d","volume":"16","author":"Zhu","year":"2024","journal-title":"Symmetry (Basel)"},{"issue":"11","key":"10.1016\/j.procs.2026.01.098_bib14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3517189","article-title":"\u201cBlockchain-based digital twins: Research trends issues, and future challenges,\u201d","volume":"54","author":"Suhail","year":"2022","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib15","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"\u201cTowards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks,\u201d","volume":"8","author":"Fernandez-Carames","year":"2020","journal-title":"IEEE access"},{"key":"10.1016\/j.procs.2026.01.098_bib16","unstructured":"Fernandez-Carames and P. Fraga-Lamas, \u201cTowards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks,\u201d 2024."},{"issue":"3","key":"10.1016\/j.procs.2026.01.098_bib17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3431726","article-title":"\u201cDeveloping cost-effective blockchain-powered applications: A case study of the gas usage of smart contract transactions in the ethereum blockchain platform., \u201d","volume":"30","author":"Zarir","year":"2021","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-023-32701-6","article-title":"\u201cQuantum resistance in blockchain networks,\u201d","volume":"13","author":"Allende","year":"2023","journal-title":"Sci Rep"},{"issue":"4","key":"10.1016\/j.procs.2026.01.098_bib19","doi-asserted-by":"crossref","first-page":"189","DOI":"10.9734\/jerr\/2025\/v27i41466","article-title":"\u201cQuantum-Resistant Blockchain Architectures for Securing Financial Data Governance against Next-Generation Cyber Threats.,\u201d","volume":"27","author":"Olisa","year":"2025","journal-title":"Journal of Engineering Research and Reports"},{"issue":"2","key":"10.1016\/j.procs.2026.01.098_bib20","first-page":"1","article-title":"\u201cSmart Contracts, Smarter Payments: Innovating Cross-Border Payments and Reporting Transactions,\u201d","volume":"2","author":"Mridul","year":"2024","journal-title":"In 2024 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr)"},{"key":"10.1016\/j.procs.2026.01.098_bib21","doi-asserted-by":"crossref","unstructured":"M. Mridul and K. Chang, \u201cSmart Contracts, Smarter Payments: Innovating Cross Border Payments and Reporting Transactions,\u201d In 2024 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr), pp. 1\u20138, 2024.","DOI":"10.1109\/CIFEr62890.2024.10772792"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib22","first-page":"45","article-title":"\u201cExploring Pattern Mining With FCM Algorithm for Predicting Female Athlete Behaviour in Sports Analytics,\u201d","volume":"1","author":"Ali-Fakulti","year":"2024","journal-title":"PatternIQ Mining."},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib23","first-page":"1","article-title":"\u201cSmart Contracts, Smarter Payments: Innovating Cross-Border Payments and Reporting Transactions,\u201d","volume":"2","author":"Mridul","year":"2024","journal-title":"In 2024 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr)"},{"issue":"23","key":"10.1016\/j.procs.2026.01.098_bib24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s21237994","article-title":"\u201cA smart contract-based dynamic consent management system for personal data usage under GDPR,\u201d","volume":"21","author":"Merlec","year":"2021","journal-title":"Sensors"},{"issue":"4","key":"10.1016\/j.procs.2026.01.098_bib25","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1007\/s11276-022-02924-y","article-title":"\u201cA blockchain and smart contract-based data provenance collection and storing in cloud environment,\u201d","volume":"28","author":"Jyoti","year":"2022","journal-title":"Wireless Networks"},{"issue":"3","key":"10.1016\/j.procs.2026.01.098_bib26","first-page":"1","article-title":"\u201cTrustless contract management: a study on the benefits of blockchain-based smart contracts,\u201d","volume":"2","author":"Gucciardi","year":"2023","journal-title":"Doctoral dissertation, Politecnico di Torino"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib27","first-page":"243","article-title":"\u201cChainspace: A Sharded Smart Contracts Platform,\u201d","volume":"2","author":"Al-Bassam","year":"2020","journal-title":"Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS \u201820)"},{"key":"10.1016\/j.procs.2026.01.098_bib28","doi-asserted-by":"crossref","unstructured":"V. Deval, \u201cMobile Smart Contracts: Exploring Scalability Challenges and Consensus Mechanisms,\u201d IEEE Access, pp. 1\u20132, 2024.","DOI":"10.1109\/ACCESS.2024.3371901"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib29","first-page":"161","article-title":"\u201cLeveraging blockchain and smart contracts for gig payments,\u201d","volume":"2","author":"Khang","year":"2024","journal-title":"In Synergy of AI and Fintech in the Digital Gig Economy"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/09540091.2024.2313853","article-title":"\u201cDetecting unknown vulnerabilities in smart contracts using opcode sequences,\u201d","volume":"36","author":"Li","year":"2024","journal-title":"Conn Sci"},{"key":"10.1016\/j.procs.2026.01.098_bib31","doi-asserted-by":"crossref","unstructured":"A. BR and B. Lakshmi, \u201cSecure Smart Contracts: Enhancing Vulnerability Detection With Graph and Tokenization Analysis,\u201d In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF), pp. 1\u20138, 2025.","DOI":"10.1109\/COMP-SIF65618.2025.10969955"},{"key":"10.1016\/j.procs.2026.01.098_bib32","first-page":"82","article-title":"\u201cSelf-Supervised Learning of Smart Contract Representations,\u201d","author":"Yang","year":"2022","journal-title":"in IEEE International Conference on Program Comprehension, IEEE Computer Society"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib33","doi-asserted-by":"crossref","first-page":"231","DOI":"10.64799\/rebicte.v10.14","article-title":"\u201cSmart Contract Enabled Cryptocurrency Payment Gateways for SAP ERP Modules,\u201d","volume":"10","author":"Jamithireddy","year":"2024","journal-title":"Research Briefs on Information and Communication Technology Evolution"},{"key":"10.1016\/j.procs.2026.01.098_bib34","unstructured":"A. Kosba and A. Miller, \u201cHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,\u201d IEEE Symposium on Security and Privacy (extended in later works 2021)., no. 2, pp. 2\u20131, 2018."},{"issue":"2","key":"10.1016\/j.procs.2026.01.098_bib35","first-page":"1","article-title":"\u201cTaxonomic insights into ethereum smart contracts by linking application categories to security vulnerabilities., \u201d","volume":"1","author":"Ortu","year":"2024","journal-title":"Sci Rep"},{"key":"10.1016\/j.procs.2026.01.098_bib36","unstructured":"N. Kandregula, \u201cSmart Contracts and DeFi Protocols: Enhancing Security, Transparency, and Efficiency in Financial Transactions.,\u201d 2025."},{"issue":"2","key":"10.1016\/j.procs.2026.01.098_bib37","first-page":"1123","article-title":"\u201cEnhancing Blockchain-Based Electoral Integrity Using zk-SNARKs and Smart Contracts,\u201d","volume":"1","author":"Liu","year":"2024","journal-title":"ACM CCS"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib38","first-page":"59","article-title":"\u201cP2P islamic investments using blockchain, smart contract and E-negotiation,\u201d","volume":"99","author":"Al-Sakran","year":"2021","journal-title":"J. Theor. Appl. Inf. Technol"},{"key":"10.1016\/j.procs.2026.01.098_bib39","first-page":"1924","article-title":"\u201cImproving Smart Contract Security with Contrastive Learning-Based Vulnerability Detection,\u201d","author":"Chen","year":"2024","journal-title":"in Proceedings - International Conference on Software Engineering, IEEE Computer Society"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib40","first-page":"15","article-title":"\u201c). A Smart Contract for Boardroom Voting with Maximum Voter Privacy,\u201d","volume":"12","author":"McCorry","year":"2020","journal-title":"Financial Cryptography and Data Security"},{"issue":"1","key":"10.1016\/j.procs.2026.01.098_bib41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.32604\/csse.2023.018349","article-title":"\u201cCustomer Churn Prediction Framework of Inclusive Finance Based on Blockchain Smart Contract,\u201d","volume":"47","author":"Yu","year":"2023","journal-title":"Computer Systems Science & Engineering"},{"issue":"6","key":"10.1016\/j.procs.2026.01.098_bib42","article-title":"\u201cEfficient Hybrid Feature Engineering and Supervised Learning Approach for Network Traffic Classification in Intrusion Detection Systems.,\u201d","volume":"18","author":"Albu-Salih","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"issue":"3","key":"10.1016\/j.procs.2026.01.098_bib43","article-title":"\u201cEfficient Two-Stage Intrusion Detection System Based on Hybrid Feature Selection Techniques and Machine Learning Classifiers.,\u201d","volume":"18","author":"Madhloom Kurdi","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.1016\/j.procs.2026.01.098_bib44","doi-asserted-by":"crossref","unstructured":"A. A. H. Alrammahi, F. A. O. Sari, Z. A. Muhammad, M. N. Kadhim, D. Al-Shammary, and A. Ibaida, \u201cEnhancing spam detection with advanced feature extraction and unsupervised clustering,\u201d International Journal of Information Technology, pp. 1\u201311, 2025.","DOI":"10.1007\/s41870-025-02723-6"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000992?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000992?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:17:07Z","timestamp":1777893427000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":44,"alternative-id":["S1877050926000992"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.098","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Quantum-Resistant Blockchain Protocol for Secure Smart Contracts in Cross-Border Finance","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.098","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}