A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open …
Blockchain technology has taken on a leading position in today's industrial applications by
providing salient features and showing significant performance since its beginning …
providing salient features and showing significant performance since its beginning …
Blockchain-based authentication in internet of vehicles: A survey
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-
hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system …
hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system …
Overcome the challenges in bio-medical instruments using IOT–A review
Abstract Internet of Things (IoT) is a term associated with the use of IP (Internet Protocol)
address sensors. It can connect to the internet and collect sensor data. The information is …
address sensors. It can connect to the internet and collect sensor data. The information is …
Storage and proximity management for centralized personal health records using an ipfs-based optimization algorithm
A Mubashar, K Asghar, AR Javed… - Journal of Circuits …, 2022 - World Scientific
Centralized Personal Health Records (PHR) are mutable with compromised security as it
may lead to a single point of failure. Confidentiality, protection and security are the common …
may lead to a single point of failure. Confidentiality, protection and security are the common …
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …
compressed version of HTTP protocol that is used for communication between lightweight …
Anonymity on blockchain based e-cash protocols—A survey
The transactions in blockchain framework, based cryptocurrencies are publicly available,
thereby accessible to all users by design. However, the anonymity of blockchain …
thereby accessible to all users by design. However, the anonymity of blockchain …
Covid-19: Digital signature impact on higher education motivation performance
At present, the process of validating documents for certain purposes cannot be done face-to-
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …
Design of anonymous authentication scheme for vehicle fog services using blockchain
X Duan, Y Guo, Y Guo - Wireless Networks, 2024 - Springer
With the advances in smart vehicles and fog computing, Fog computing is extended to
traditional Vehicular Ad Hoc Networks (VANETs). As a geographically distributed paradigm …
traditional Vehicular Ad Hoc Networks (VANETs). As a geographically distributed paradigm …
Smart digital signature berbasis blockchain pada pendidikan tinggi menggunakan metode swot
M Rakhmansyah, U Rahardja, NPL Santoso… - ADI Bisnis Digital …, 2021 - adi-journal.org
Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …
Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography
R Ganesan - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Technological advancements in cloud computing due to increased connectivity and
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …