
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue III, March 2026
3. R. Alfianda, S. Maulana, and T. Hidayat, "Evaluating AES encryption and SHA-256 hashing in
decentralized lending platforms," IEEE Transactions on Secure Computing, vol. 12, no. 3, pp. 210-224,
2025.
4. R. Senthil, "Architectural patterns for integrating React and Spring Boot in high-security financial
applications," Journal of Web Development and Engineering, vol. 9, no. 4, pp. 334-349, 2024.
5. Y. Yan, "Dual-key access control mechanisms for virtual vault guards in modern pawnshops,"
International Journal of Information Security, vol. 11, no. 2, pp. 88-102, 2023.
6. F. Schär, "Decentralized finance: On blockchain- and smart contract-based financial markets," Federal
Reserve Bank of St. Louis Review, vol. 103, no. 2, pp. 153-174, 2021.
7. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: Architecture,
consensus, and future trends," IEEE International Congress on Big Data, vol. 6, no. 1, pp. 557-564, 2017.
8. K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things in asset
management," IEEE Access, vol. 4, pp. 2292-2303, 2016.
9. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The blockchain model of cryptography
and privacy-preserving smart contracts," IEEE Symposium on Security and Privacy, vol. 2, no. 1, pp. 839-
858, 2016.
10. L. Luu, D. H. Chu, H. Olickel, P. Saxena, and A. Hobor, "Making smart contracts smarter in decentralized
finance," ACM SIGSAC Conference on Computer and Communications Security, vol. 8, no. 3, pp. 254-
269, 2016.
11. Yamane, T. (1967). Statistics: An Introductory Analysis. 2nd Ed. New York: Harper and Row. [12] H.
Treiblmaier, "Toward more rigorous blockchain research: Recommendations for writing blockchain case
studies," Frontiers in Blockchain, vol. 2, no. 3, pp. 1-15, 2019.
12. M. Vukolić, "The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication," Open
Problems in Network Security, vol. 9, no. 2, pp. 112-125, 2015.
13. Herlihy, M. (2018). "Atomic Cross-Chain Swaps." Proceedings of the 2018 ACM Symposium on
Principles of Distributed Computing, pp. 245-254. [15] J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.
A. Kroll, and E. W. Felten, "SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies,"
IEEE Symposium on Security and Privacy, vol. 3, no. 1, pp. 104-121, 2015
14. P. Modesti, L. Freitas, Q. Shotomiwa, and A. Almehrej, "Security analysis of the open banking account
and transaction API protocol," Cyber Security and Applications, vol. 3, pp. 100-115, 2025.
15. M. A. Kadam, A. Jangid, and N. Singh, "Embedded finance: Scope, challenges and opportunities,"
BVIMSR Journal of Management Research, vol. 16, no. 2, pp. 45-58, 2024.
16. Traceable AI, "API Security Report: Financial Sector Vulnerabilities," Technical Report on Cybersecurity
in Fintech, pp. 12-29, 2023.
17. ITU-T, "Recommendation F.751.8: Technical framework for distributed ledger technology (DLT) to cope
with regulation," ITU-T Series F: Non-telephone telecommunication services, vol. 1, no. 1, pp. 1-24, 2023.
18. IEEE Standards Association, "IEEE P2418.1 Standard for the Framework of Blockchain Use in Internet
of Things (IoT) and Distributed Systems," IEEE Standards for Emerging Technologies, pp. 101-118, 2023.
19. OpenID Foundation, "Financial-grade API (FAPI) Security Profile – Part 1: Baseline," OpenID
Foundation Security Framework, vol. 3, no. 1, pp. 77-92, 2023.
20. B. Tekinerdogan, Ö. Köksal, and T. Çelik, "System architecture design of secure distributed platforms,"
Applied Sciences, vol. 13, no. 7, pp. 4173-4188, 2023