Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey

S Shi, D He, L Li, N Kumar, MK Khan, KKR Choo - Computers & security, 2020 - Elsevier
Due to the popularity of blockchain, there have been many proposed applications of
blockchain in the healthcare sector, such as electronic health record (EHR) systems …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

[HTML][HTML] ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care

A Dubovitskaya, F Baig, Z Xu, R Shukla… - Journal of medical …, 2020 - jmir.org
Background: With increased specialization of health care services and high levels of patient
mobility, accessing health care services across multiple hospitals or clinics has become very …

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

A lightweight authentication and key agreement scheme for Internet of Drones

Y Zhang, D He, L Li, B Chen - Computer Communications, 2020 - Elsevier
Abstract Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport
the commodity with the help of embedded various sensors. They have been widely used in …

Core concepts, challenges, and future directions in blockchain: A centralized tutorial

J Kolb, M AbdelBaky, RH Katz, DE Culler - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchains are a topic of immense interest in academia and industry, but their true nature is
often obscured by marketing and hype. In this tutorial, we explain the fundamental elements …

Resilientdb: Global scale resilient blockchain fabric

S Gupta, S Rahnama, J Hellings, M Sadoghi - arXiv preprint arXiv …, 2020 - arxiv.org
Recent developments in blockchain technology have inspired innovative new designs in
resilient distributed and database systems. At their core, these blockchain applications …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020 - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …