A survey on consensus mechanisms and mining strategy management in blockchain networks

W Wang, DT Hoang, P Hu, Z Xiong, D Niyato… - Ieee …, 2019 - ieeexplore.ieee.org
The past decade has witnessed the rapid evolution in blockchain technologies, which has
attracted tremendous interests from both the research communities and industries. The …

[HTML][HTML] Authenticating health activity data using distributed ledger technologies

J Brogan, I Baskaran, N Ramachandran - Computational and structural …, 2018 - Elsevier
The on-demand digital healthcare ecosystem is on the near horizon. It has the potential to
extract a wealth of information from “big data” collected at the population level, to enhance …

PRISED tangle: A privacy-aware framework for smart healthcare data sharing using IOTA tangle

S Abdullah, J Arshad, MM Khan, M Alazab… - Complex & Intelligent …, 2023 - Springer
Healthcare has evolved significantly in recent years primarily due to the advancements in
and increasing adoption of technology in healthcare processes such as data collection …

A theoretical model of user acceptance of blockchain-based peer-to-peer accommodation

I Nur Muharam, IP Tussyadiah… - Current Issues in …, 2024 - Taylor & Francis
Blockchain could disrupt traditional accommodation services by enabling safe,
decentralised direct connections between guests and hosts. However, how users will accept …

A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems

TV Le, CF Lu, CL Hsu, TK Do, YF Chou, WC Wei - IEEE Access, 2022 - ieeexplore.ieee.org
6G technology is now attracting many scientific researchers due to its prominent features
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …

Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications

D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …

An efficient key management and multi-layered security framework for SCADA systems

D Upadhyay, M Zaman, R Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial
control systems. Industrial organizations perform operations remotely through SCADA …

A modified secure hash design to circumvent collision and length extension attacks

ZA Al-Odat, SU Khan, E Al-Qtiemat - Journal of Information Security and …, 2022 - Elsevier
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-
2. The proposed work produces a strengthened secure hash design using the fusion …

Ptp security measures and their impact on synchronization accuracy

F Rezabek, M Helm, T Leonhardt… - 2022 18th International …, 2022 - ieeexplore.ieee.org
The Precision Time Protocol (PTP) synchronizes clocks in a network with high precision. The
protocol finds use in many areas, such as smart manufacturing, intra-vehicular networks …

Hardware-based hash functions for network applications

F Yamaguchi, H Nishi - 2013 19th IEEE International …, 2013 - ieeexplore.ieee.org
For rich network services, it is indispensable to reconstruct TCP stream in the middle of the
network. In this reconstruction function, managing a large number of streams is a crucial as …