A literature review of blockchain technology applications in supply chains: A comprehensive analysis of themes, methodologies and industries
In the past few years, blockchain, the underlying technology of Bitcoin, has received
considerable attention from academia and industry. It is widely accepted that blockchain …
considerable attention from academia and industry. It is widely accepted that blockchain …
Blockchain based solutions to secure IoT: Background, integration trends and a way forward
The lack of intrinsic security technologies in the current Internet of Things (IoT) systems
brings forth numerous security vulnerabilities and privacy risks. To this end, a distributed and …
brings forth numerous security vulnerabilities and privacy risks. To this end, a distributed and …
The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial
This article presents research challenges and a tutorial on performance evaluation of
blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …
blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …
Blockchain technology for intelligent transportation systems: A systematic literature review
The use of Blockchain technology has recently become widespread. It has emerged as an
essential tool in various academic and industrial fields, such as healthcare, transportation …
essential tool in various academic and industrial fields, such as healthcare, transportation …
An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals
Deep learning, for image data processing, has been widely used to solve a variety of
problems related to medical practices. However, researchers are constantly struggling to …
problems related to medical practices. However, researchers are constantly struggling to …
An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs
In vehicular ad-hoc networks (VANETs), safety messages are exchanged among vehicles
and between vehicles and infrastructure to ensure passengers' safety and efficiency in …
and between vehicles and infrastructure to ensure passengers' safety and efficiency in …
A comprehensive survey on authentication and privacy-preserving schemes in VANETs
P Mundhe, S Verma, S Venkatesan - Computer Science Review, 2021 - Elsevier
Vehicular ad hoc networks (VANETs) promise to enhance transport efficiency, passenger
safety, and comfort through the exchange of traffic and infotainment information to vehicles …
safety, and comfort through the exchange of traffic and infotainment information to vehicles …
Blockchain-enabled privacy-preserving authentication mechanism for transportation CPS with cloud-edge computing
In this article, we propose a secure and effective blockchain-enabled privacy-preserving
authentication scheme for the transportation cyber-physical system (CPS) with the cloud …
authentication scheme for the transportation cyber-physical system (CPS) with the cloud …
Secure and efficient authenticated key management scheme for UAV-assisted infrastructure-less IoVs
H Tan, W Zheng, P Vijayakumar - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Nowadays, with the purpose of fulfilling the increasing demands for emerging extensive and
ubiquitous accessibility to modern intelligent transportation systems (ITS), the conventional …
ubiquitous accessibility to modern intelligent transportation systems (ITS), the conventional …
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
I Ali, F Li - Vehicular Communications, 2020 - Elsevier
Abstract Generally, Vehicular Ad Hoc Networks (VANETs) make use of the Public Key
Infrastructure (PKI) to authenticate and determine the integrity of traffic-related messages …
Infrastructure (PKI) to authenticate and determine the integrity of traffic-related messages …