M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the Internet of Things (IoT), decentralized approaches for trust management are gaining …
Blockchain technology is becoming increasingly attractive to the next generation, as it is uniquely suited to the information era. Blockchain technology can also be applied to the …
Q Xing, B Wang, X Wang - Symmetry, 2018 - mdpi.com
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have …
M Al-Shabi, A Al-Qarafi - International Journal of Electrical and …, 2022 - academia.edu
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been …
Y Zhang, W Liu, Z Xia, Z Wang, L Liu… - Wireless …, 2021 - Wiley Online Library
Domain Name System (DNS) is a widely used infrastructure for remote control and batch management of IoT devices. As a critical Internet infrastructure, DNS is structured as a tree …
S Zhang, JH Lee - IEEE Access, 2019 - ieeexplore.ieee.org
Rewriting-history attacks can erase all valid records of blockchain-based systems, which is extremely devastating. To deter such attacks, we design a new smart contract-based secure …
Q Xing, X Wang, X Xu, J Lin, F Wang, C Li, B Wang - Sensors, 2023 - mdpi.com
Log-based public key infrastructure (PKI) refers to a robust class of CA-attack-resilient PKI that enhance transparency and accountability in the certificate revocation and issuance …