Research Article
Blockchain Ecosystem for Credit Transfer in Education
Table 2
Scalability analysis by considering various attacks.
| | Schemes | Security techniques used | Replay attack | Collision tamper attack | Sybil attack | | Proposed scheme | Yes | Yes | Yes | Yes | | EduCTX [2] | Yes | Yes | No | No | | VECefblock [3] | Yes | No | No | No | | Credence ledger [15] | Yes | No | No | No |
|
|