[HTML][HTML] Blockchain and IoT convergence—a systematic survey on technologies, protocols and security

A Pieroni, N Scarpato, L Felli - Applied Sciences, 2020 - mdpi.com
The Internet of Things (IoT) as a concept is fascinating and exciting, with an exponential
growth just beginning. The IoT global market is expected to grow from 170 billion USD in …

[HTML][HTML] Survey: an overview of lightweight RFID authentication protocols suitable for the maritime internet of things

G Mudra, H Cui, MN Johnstone - Electronics, 2023 - mdpi.com
The maritime sector employs the Internet of Things (IoT) to exploit many of its benefits to
maintain a competitive advantage and keep up with the growing demands of the global …

A comparative study of Message Digest 5 (MD5) and SHA256 algorithm

D Rachmawati, JT Tarigan… - Journal of Physics …, 2018 - iopscience.iop.org
The document is a collection of written or printed data containing information. The more
rapid advancement of technology, the integrity of a document should be kept. Because of the …

[HTML][HTML] Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry

LA Ajao, J Agajo, EA Adedokun, L Karngong - J, 2019 - mdpi.com
This research work proposes a method for the securing and monitoring of petroleum product
distribution records in a decentralized ledger database using blockchain technology. The …

A hybrid cryptography algorithm for cloud computing security

DP Timothy, AK Santra - 2017 International conference on …, 2017 - ieeexplore.ieee.org
In the present scenario, the Cloud Computing is very famous and flexible technology. It
facilitates customers with effortlessness, quickness, competence etc in their work area …

Digital signature authentication using asymmetric key cryptography with different byte number

M Sagar Hossen, T Tabassum, M Ashiqul Islam… - … Computing and Mobile …, 2021 - Springer
Nowadays, each and every system needs proper security. Only proper security can save
important documents. There are different types of security systems that people use for safety …

A detailed analysis of data consistency concepts in data exchange formats (JSON & XML)

G Goyal, K Singh, KR Ramkumar - … International Conference on …, 2017 - ieeexplore.ieee.org
JavaScript Object Notation (JSON) is a syntax for exchanging and storing data, the text data
is converted in Object form and processed. The consistency and data integrity are the big …

A comparative study MD5 and SHA1 algorithms to encrypt REST API authentication on mobile-based application

AF Najib, EH Rachmawanto, CA Sari… - … on Information and …, 2019 - ieeexplore.ieee.org
Mobile-based applications that use the Client-Server system certainly require an Application
Programming Interface (API) as an intermediary to communicate with each other. Security is …

A durable biometric authentication scheme via blockchain

AD Dinesh, CDP Reddy, GV Gopi… - … on Advances in …, 2021 - ieeexplore.ieee.org
In the digital era, one of the aspects is data security, where the combination of biometrics
with blockchain is introduced as an advanced and durable technique to protect sensitive …

Hybrid probabilistic triple encryption approach for data security in cloud computing

V Kulshrestha, S Verma… - International Journal of …, 2022 - inderscienceonline.com
Cloud computing (CC) is a popular paradigm with dynamic capabilities where statistics are
maintained, managed, and backed up remotely. It allows consumers as well as corporations …