Research Article
Blockchain Ecosystem for Credit Transfer in Education
Table 2
Scalability analysis by considering various attacks.
| Schemes | Security techniques used | Replay attack | Collision tamper attack | Sybil attack | Proposed scheme | Yes | Yes | Yes | Yes | EduCTX [2] | Yes | Yes | No | No | VECefblock [3] | Yes | No | No | No | Credence ledger [15] | Yes | No | No | No |
|
|