[HTML][HTML] A blockchain-based notarization service for biomedical knowledge retrieval

AS Kleinaki, P Mytis-Gkometh, G Drosatos… - Computational and …, 2018 - Elsevier
Biomedical research and clinical decision depend increasingly on scientific evidence
realized by a number of authoritative databases, mostly public and continually enriched via …

Construction information authentication and integrity using blockchain-oriented watermarking techniques

J Lou, W Lu - Automation in Construction, 2022 - Elsevier
Abstract Information authentication and integrity (IAI) plays a critical role in construction
digital transformation. Blockchain technology can prevent information from fabrication and …

Accurate and decentralized timestamping using smart contracts on the Ethereum blockchain

G Estevam, LM Palma, LR Silva, JE Martina… - Information Processing & …, 2021 - Elsevier
Timestamps allow us to identify a date and time when a piece of data existed or an event
took place. For example, we use timestamps to establish the date when we grant a patent …

Combining smart construction objects–enabled blockchain oracles and signature techniques to ensure information authentication and integrity in construction

W Lu, J Lou, L Wu - Journal of Computing in Civil Engineering, 2023 - ascelibrary.org
Reliable and accurate information is crucial for decision making in construction projects.
However, stakeholders driven by profit have the potential to manipulate information …

Quantum networks: where should we be heading?

M Sasaki - Quantum Science and Technology, 2017 - iopscience.iop.org
Quantum key distribution network has become a reality in practical environment. Quantum
repeaters have been explored in various physical systems and their combinations. For …

Identifikasi Pelayanan Publik Berbasis E-Government Pemerintah Kota Kendari Pada Masa New Normal

DM Loka, A Abdullah… - NeoRespublica: Jurnal …, 2022 - neorespublica.uho.ac.id
Abstract Pemerintah Kota Kendari melalui perangkat daerahnya telah membuat berbagai
Berbagai inovasi layanan elektronik berbasis aplikasi yang bertujuan memudahkan …

Towards securing data transfers against silent data corruption

B Charyyev, A Alhussen, H Sapkota… - 2019 19th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Scientific applications generate large volumes of data that often needs to be moved between
geographically distributed sites for collaboration or backup which has led to a significant …

Systematic digital signing in Estonian e-government processes: influencing factors, technologies, change management

I Pappel, I Pappel, J Tepandi, D Draheim - Transactions on Large-Scale …, 2017 - Springer
In Estonia, digital signing started with the Digital Signatures Act already as early as in 2000.
The aim to make digital signing and its use with various types of documents more …

LINCOS: A storage system providing long-term integrity, authenticity, and confidentiality

J Braun, J Buchmann, D Demirel, M Geihs… - Proceedings of the …, 2017 - dl.acm.org
The amount of digital data that requires long-term protection of integrity, authenticity, and
confidentiality grows rapidly. Examples include electronic health records, genome data, and …

A cloud-based crime reporting system with identity protection

TF Shih, CL Chen, BY Syu, YY Deng - Symmetry, 2019 - mdpi.com
Criminal activities have always been a part of human society, and even today, in a world of
extremely advanced surveillance and policing capabilities, many different kinds of crimes …