A Systematic Literature Mapping on Using Blockchain Technology in Identity Management
TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …
leveraging its features. Traditional identity management systems have many issues …
Enterprise blockchain identity management: a bibliometric content analysis of a nascent field
MY Chuang, AH Juma'h - Technology Analysis & Strategic …, 2024 - Taylor & Francis
Blockchain has emerged as an innovative solution for organisations' data-sharing. This
paper utilises bibliometric content analysis to identify key keywords (identity management …
paper utilises bibliometric content analysis to identify key keywords (identity management …
Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment
Nowadays, data storage in a cloud environment plays an important role in managing large
scale information. However, the main problem with using a cloud environment is data …
scale information. However, the main problem with using a cloud environment is data …
A Systematic Literature Review of Blockchain Technology: Applications Fields, Platforms, and Consensus Protocols
CA Estrada, SS Naranjo, VJ Toasa… - Proceedings of the 2023 …, 2023 - dl.acm.org
In the context of today's digital era, blockchain technology has established itself as one of
the transformative innovations that pushes the boundaries of data management and …
the transformative innovations that pushes the boundaries of data management and …
BPMT: A hybrid model for secure and effective electronic medical record management system
M Nasreen, SK Singh - Journal of Computational Science, 2024 - Elsevier
Designing an efficient distributed blockchain system to store and access rising electronic
medical records (EMR) is still challenging. Although many techniques have been designed …
medical records (EMR) is still challenging. Although many techniques have been designed …
Enhancing Cloud Data Security with Davies-Meyer Hash and Gestalt Pattern Matching in Blockchain
R Aburukba, K El-Fakih - 2024 International Symposium on …, 2024 - ieeexplore.ieee.org
Cloud computing enables access to compute, storage, and software over the internet.
Security is a critical aspect that enables individuals to exchange information while …
Security is a critical aspect that enables individuals to exchange information while …
Role Of Blockchain in Securing Patient Data for Health Care Application
Komal, Rajkumar - 2022 10th International Conference on …, 2022 - ieeexplore.ieee.org
The purpose of blockchain technology is to make it feasible to store and transfer digital data
without the danger of it being changed in transit. Immutable ledgers or transaction records …
without the danger of it being changed in transit. Immutable ledgers or transaction records …
Design and implementation of a framework for blockchain based security using IoT
T Sureshkumar, R Sivaraj… - Journal of Intelligent & …, 2023 - content.iospress.com
Abstract The Internet of Things (IoT) has altered the world in the last few years due to its
capacity to impact almost every part of life. However, IoT raises concerns about data security …
capacity to impact almost every part of life. However, IoT raises concerns about data security …
A High-Performance Data Verification Mechanism in Blockchain-Based IoT Systems
J Zhang, P Zhou, Y Sun, L Luo - 2023 IEEE Intl Conf on Parallel …, 2023 - ieeexplore.ieee.org
With the rapid development of the distributed network and communication, the Internet of
Things (IoT) systems have been applied to all walks of life. Blockchain technology is one of …
Things (IoT) systems have been applied to all walks of life. Blockchain technology is one of …
A systematic literature review of blockchain technology for identity management
M Alharbi, FK Hussain - International Conference on Advanced Information …, 2022 - Springer
Thanks to identity management solutions, identities and operations such as access control
have become increasingly common in real-world applications. The rapid growth of …
have become increasingly common in real-world applications. The rapid growth of …