A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open …

K Hameed, M Barika, S Garg, MB Amin… - Journal of Industrial …, 2022 - Elsevier
Blockchain technology has taken on a leading position in today's industrial applications by
providing salient features and showing significant performance since its beginning …

Blockchain-based authentication in internet of vehicles: A survey

S Abbas, MA Talib, A Ahmed, F Khan, S Ahmad… - Sensors, 2021 - mdpi.com
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-
hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system …

Overcome the challenges in bio-medical instruments using IOT–A review

R Karthick, R Ramkumar, M Akram… - Materials Today …, 2021 - Elsevier
Abstract Internet of Things (IoT) is a term associated with the use of IP (Internet Protocol)
address sensors. It can connect to the internet and collect sensor data. The information is …

Storage and proximity management for centralized personal health records using an ipfs-based optimization algorithm

A Mubashar, K Asghar, AR Javed… - Journal of Circuits …, 2022 - World Scientific
Centralized Personal Health Records (PHR) are mutable with compromised security as it
may lead to a single point of failure. Confidentiality, protection and security are the common …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

Anonymity on blockchain based e-cash protocols—A survey

N Andola, VK Yadav, S Venkatesan, S Verma - Computer Science Review, 2021 - Elsevier
The transactions in blockchain framework, based cryptocurrencies are publicly available,
thereby accessible to all users by design. However, the anonymity of blockchain …

Covid-19: Digital signature impact on higher education motivation performance

U Rahardja, S Sudaryono, NPL Santoso… - International Journal of …, 2020 - ijair.id
At present, the process of validating documents for certain purposes cannot be done face-to-
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …

Design of anonymous authentication scheme for vehicle fog services using blockchain

X Duan, Y Guo, Y Guo - Wireless Networks, 2024 - Springer
With the advances in smart vehicles and fog computing, Fog computing is extended to
traditional Vehicular Ad Hoc Networks (VANETs). As a geographically distributed paradigm …

Smart digital signature berbasis blockchain pada pendidikan tinggi menggunakan metode swot

M Rakhmansyah, U Rahardja, NPL Santoso… - ADI Bisnis Digital …, 2021 - adi-journal.org
Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …

Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography

R Ganesan - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Technological advancements in cloud computing due to increased connectivity and
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …