Non-fungible token (NFT): Overview, evaluation, opportunities and challenges
The Non-Fungible Token (NFT) market is mushrooming in recent years. The concept of NFT
originally comes from a token standard of Ethereum, aiming to distinguish each token with …
originally comes from a token standard of Ethereum, aiming to distinguish each token with …
[HTML][HTML] A review of the key challenges of non-fungible tokens
The nonfungible token (NFT) marketplace spiked in the recent past. The concept originated
initially as a token standard of Ethereum, an open-source blockchain with smart contract …
initially as a token standard of Ethereum, an open-source blockchain with smart contract …
Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Due to the popularity of blockchain, there have been many proposed applications of
blockchain in the healthcare sector, such as electronic health record (EHR) systems …
blockchain in the healthcare sector, such as electronic health record (EHR) systems …
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
A survey of physical-layer authentication in wireless communications
N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
[HTML][HTML] Blockchain in healthcare and IoT: A systematic literature review
EM Adere - Array, 2022 - Elsevier
Blockchain technology is a highly regarded technology that possesses a plethora of exciting
features. This paper analyzes trends and highlights the potential benefits of blockchain …
features. This paper analyzes trends and highlights the potential benefits of blockchain …
[HTML][HTML] FHIRChain: applying blockchain to securely and scalably share clinical data
Secure and scalable data sharing is essential for collaborative clinical decision making.
Conventional clinical data efforts are often siloed, however, which creates barriers to …
Conventional clinical data efforts are often siloed, however, which creates barriers to …
Experimental quantum secure network with digital signatures and encryption
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
Precision health data: Requirements, challenges and existing techniques for data security and privacy
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …
environment, social media, medical records, and medical insurance claims to enable …