Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey.

MS Islam, MA Rahman… - … in Engineering & …, 2024 - search.ebscohost.com
Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital
transaction is gradually gaining popularity in the digital era for various areas like finance …

Blockchain technology with its application in medical and healthcare systems: A survey

BB Gupta, Mamta, R Mehla, W Alhalabi… - … Journal of Intelligent …, 2022 - Wiley Online Library
With the advent of the 21st century, healthcare systems all around the world are facing
challenges at an unprecedented scale. The recent covid‐19 outbreak is a glaring example …

CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance

L Yi, Y Sun, B Wang, L Duan, H Ma… - … Journal of Intelligent …, 2022 - Wiley Online Library
Usage‐based insurance (UBI) provides reasonable vehicle insurance premiums based on
vehicle usage and driving behavior. In general, there are three major issues in realizing …

SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context

CEB Santos Jr, LMD Silva, MF Torquato, SN Silva… - Sensors, 2024 - mdpi.com
This work proposes an implementation of the SHA-256, the most common blockchain hash
algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

A robust blockchain-based watermarking using edge detection and wavelet transform

PK Mannepalli, V Richhariya, SK Gupta… - Multimedia Tools and …, 2024 - Springer
Nowadays, image security is a crucial component of the scientific community. The
transparent marking is often used to keep medical imaging information from being stolen …

Behavioral authentication for security and safety

C Wang, H Tang, H Zhu, J Zheng… - Security and …, 2024 - sands.edpsciences.org
The issues of both system security and safety can be dissected integrally from the
perspective of behavioral appropriateness. That is, a system that is secure or safe can be …

Behavioral Authentication for Security and Safety

C Wang, H Tang, H Zhu, J Zheng, C Jiang - arXiv preprint arXiv …, 2023 - arxiv.org
The issues of both system security and safety can be dissected integrally from the
perspective of behavioral\emph {appropriateness}. That is, a system is secure or safe can be …

Protecting the Multimedia using Privacy Preserving Homomorphic Encryption Based Blockchain Model in IoT

JD Panalkar, VS SD… - … on Evolutionary Algorithms …, 2023 - ieeexplore.ieee.org
Data auditing is becoming increasingly important as more customers want to farm out large
programme data produced by Net of Things (IoT) strategy to the cloud. This is because it …

Blockchain event ordering algorithm based on high-dimensional multi-objective differential evolution

K Li - Applied Mathematics and Nonlinear Sciences - sciendo.com
Since the birth of Bitcoin, blockchain technology has been widely used in many fields, such
as finance, supply chain management, smart contracts, etc. and has been highly valued for …