A review of aggregation algorithms for the internet of things

F Al-Doghman, Z Chaczko… - 2017 25th International …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) epitomizes the upcoming eminent transition in the world's
economy and human lifestyle where people and various objects are correlated within …

EB-BFT: An elastic batched BFT consensus protocol in blockchain

B Zhang, L Kong, Q Li, X Min, Y Liu, Z Che - Future Generation Computer …, 2023 - Elsevier
With the rapid increasing number of applications using blockchain, how to improve the
throughput of business and reduce the latency of committing transaction on the blockchain …

Blockchain: Perspectives and issues

S Sakho, Z Jianbiao, F Essaf… - Journal of Intelligent & …, 2019 - content.iospress.com
The tamper-proof digital database on which are written all exchanges between its users
since its inception is named Blockchain. The blockchain is a system of storage distributed on …

Comprehensive and systematic study on the fault tolerance architectures in cloud computing

V Mohammadian, NJ Navimipour… - Journal of Circuits …, 2020 - World Scientific
Providing dynamic resources is based on the virtualization features of the cloud
environment. Cloud computing as an emerging technology uses a high availability of …

[PDF][PDF] Cyber attacks and impacts: A case study in saudi arabia

RK Alqurashi, MA AlZain, B Soh, M Masud… - International …, 2020 - researchgate.net
With the development of technology, modern computer-assisted and Internet crimes have
been increasing all this while, and there is a need to further investigate the current status of …

[PDF][PDF] Cybersecurity attacks on wireless sensor networks in smart cities: an exposition

H Alshambri, MA AlZain, B Soh, M Masud… - International Journal of …, 2020 - researchgate.net
The smart city concept is a link between digital world and the physical world. The smart city
is designed and constructed by using advanced techniques which consist of sensors …

[PDF][PDF] Computer forensics: dark net forensic framework and tools used for digital evidence detection

MA Alotaibi, MA AlZain, B Soh, M Masud… - International Journal of …, 2019 - core.ac.uk
As the development of technology increases and its use becomes increasingly more
widespread, hence computer crimes grow. Computer forensics research is becoming more …

Byzantine fault-tolerant architecture in cloud data management

MA AlZain, AS Li, B Soh, M Masud - International Journal of …, 2016 - igi-global.com
One of the main challenges in cloud computing is to build a healthy and efficient storage for
securely managing and preserving data. This means a cloud service provider needs to …

Provenance and authentication of oracle sensor data with block chain lightweight wireless network authentication scheme for constrained oracle sensors

G Gordon - 2017 - library2.smu.ca
With the significant increase in the dependence of contextual data from constrained IoT, the
blockchain has been proposed as a possible solution to address growing concerns from …

基于区块链机制的云计算环境下服务组合策略的研究.

王磊, 赵晓永 - Application Research of Computers/Jisuanji …, 2019 - search.ebscohost.com
云计算环境下服务组合具有规模大, 复杂性高, 失效类型多以及资源动态变化等特征, 因此安全,
可信的服务组合方案是云环境下海量服务资源灵活部署, 按需提供的最大挑战 …