Blockchains for Internet of Things: Fundamentals, Applications, and Challenges

Y Wu, Y Hu, M Chen, Y Yesha, M Debbah - IEEE Network, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) services necessitate the storage, transmission, and analysis of
diverse data for inference, autonomy, and control. Blockchains, with their inherent properties …

Adaptation in Edge Computing: A review on design principles and research challenges

F Golpayegani, N Chen, N Afraz, E Gyamfi… - ACM Transactions on …, 2024 - dl.acm.org
Edge Computing places the computational services and resources closer to the user
proximity, to reduce latency, and ensure the quality of service and experience. Low latency …

Towards a mining metaverse

P Stothard, P Ryan, T Kurata… - Mining Technology, 2024 - journals.sagepub.com
Access to persistent computer-generated virtual worlds may provide a powerful tool for
conceptualising the mining cycle and managing the domains of exploration, feasibility …

Exploring Trust Modelling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review

T Lenard, A Collen, M Benyahya, NA Nijdam… - IEEE …, 2023 - ieeexplore.ieee.org
Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc
Distributed Wireless Networks (DWNs) to stimulate and improve cooperation between …

Quantum Hardware Security and Near-term Applications

Y Ma - 2023 - theses.hal.science
Hardware security primitives are hardware-based fundamental components and
mechanisms used to enhance the security of modern computing systems in general. These …