Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Due to the popularity of blockchain, there have been many proposed applications of
blockchain in the healthcare sector, such as electronic health record (EHR) systems …
blockchain in the healthcare sector, such as electronic health record (EHR) systems …
A survey of physical-layer authentication in wireless communications
N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
[HTML][HTML] ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care
A Dubovitskaya, F Baig, Z Xu, R Shukla… - Journal of medical …, 2020 - jmir.org
Background: With increased specialization of health care services and high levels of patient
mobility, accessing health care services across multiple hospitals or clinics has become very …
mobility, accessing health care services across multiple hospitals or clinics has become very …
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
A lightweight authentication and key agreement scheme for Internet of Drones
Abstract Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport
the commodity with the help of embedded various sensors. They have been widely used in …
the commodity with the help of embedded various sensors. They have been widely used in …
Core concepts, challenges, and future directions in blockchain: A centralized tutorial
Blockchains are a topic of immense interest in academia and industry, but their true nature is
often obscured by marketing and hype. In this tutorial, we explain the fundamental elements …
often obscured by marketing and hype. In this tutorial, we explain the fundamental elements …
Resilientdb: Global scale resilient blockchain fabric
Recent developments in blockchain technology have inspired innovative new designs in
resilient distributed and database systems. At their core, these blockchain applications …
resilient distributed and database systems. At their core, these blockchain applications …
Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Secure remote state estimation against linear man-in-the-middle attacks using watermarking
J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020 - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …
Linking sensitive data
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …
increasing demand to share, integrate, and link such data within and across organisations in …