A survey on consensus mechanisms and mining strategy management in blockchain networks
The past decade has witnessed the rapid evolution in blockchain technologies, which has
attracted tremendous interests from both the research communities and industries. The …
attracted tremendous interests from both the research communities and industries. The …
[HTML][HTML] Authenticating health activity data using distributed ledger technologies
J Brogan, I Baskaran, N Ramachandran - Computational and structural …, 2018 - Elsevier
The on-demand digital healthcare ecosystem is on the near horizon. It has the potential to
extract a wealth of information from “big data” collected at the population level, to enhance …
extract a wealth of information from “big data” collected at the population level, to enhance …
PRISED tangle: A privacy-aware framework for smart healthcare data sharing using IOTA tangle
Healthcare has evolved significantly in recent years primarily due to the advancements in
and increasing adoption of technology in healthcare processes such as data collection …
and increasing adoption of technology in healthcare processes such as data collection …
A theoretical model of user acceptance of blockchain-based peer-to-peer accommodation
I Nur Muharam, IP Tussyadiah… - Current Issues in …, 2024 - Taylor & Francis
Blockchain could disrupt traditional accommodation services by enabling safe,
decentralised direct connections between guests and hosts. However, how users will accept …
decentralised direct connections between guests and hosts. However, how users will accept …
A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems
TV Le, CF Lu, CL Hsu, TK Do, YF Chou, WC Wei - IEEE Access, 2022 - ieeexplore.ieee.org
6G technology is now attracting many scientific researchers due to its prominent features
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …
Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications
D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …
secure communication. They play a vital role in a wide range of applications such as …
An efficient key management and multi-layered security framework for SCADA systems
D Upadhyay, M Zaman, R Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial
control systems. Industrial organizations perform operations remotely through SCADA …
control systems. Industrial organizations perform operations remotely through SCADA …
A modified secure hash design to circumvent collision and length extension attacks
ZA Al-Odat, SU Khan, E Al-Qtiemat - Journal of Information Security and …, 2022 - Elsevier
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-
2. The proposed work produces a strengthened secure hash design using the fusion …
2. The proposed work produces a strengthened secure hash design using the fusion …
Ptp security measures and their impact on synchronization accuracy
The Precision Time Protocol (PTP) synchronizes clocks in a network with high precision. The
protocol finds use in many areas, such as smart manufacturing, intra-vehicular networks …
protocol finds use in many areas, such as smart manufacturing, intra-vehicular networks …
Hardware-based hash functions for network applications
F Yamaguchi, H Nishi - 2013 19th IEEE International …, 2013 - ieeexplore.ieee.org
For rich network services, it is indispensable to reconstruct TCP stream in the middle of the
network. In this reconstruction function, managing a large number of streams is a crucial as …
network. In this reconstruction function, managing a large number of streams is a crucial as …