Blockchain application for Internet of Things and future prospect—A survey

I Khan, Y Majib, R Ullah, O Rana - Internet of Things, 2024 - Elsevier
In recent years, the Internet of Things (IoT) has been shaping our lives through billions of
internet based interconnected devices. However, due to the decentralized nature of these …

Document de-registration

RPS Ahuja, M Howard, R Lowe, E de la Iglesia… - US Patent …, 2013 - Google Patents
US8548170B2 - Document de-registration - Google Patents US8548170B2 - Document de-registration
- Google Patents Document de-registration Download PDF Info Publication number …

Assessing the security implication of Bitcoin exchange rates

AR Sai, J Buckley, A Le Gear - Computers & Security, 2019 - Elsevier
Cryptographic assets such as Bitcoin and Ethereum provide distributed consensus with a
Proof-of-Work protocol and incentive-based engineering. The consensus is inherently …

Attributes of captured objects in a capture system

RPS Ahuja, W Deninger, E de la Iglesia… - US Patent …, 2014 - Google Patents
US8683035B2 - Attributes of captured objects in a capture system - Google Patents
US8683035B2 - Attributes of captured objects in a capture system - Google Patents Attributes of …

Verifying captured objects before presentation

R Lowe, S Coleman, E de la Iglesia, S King… - US Patent …, 2012 - Google Patents
Continuation of application No. 10/995,454,? led on(N CW 22 200 4 HOW Pat NO 7 77 4 60
4 Objects can be extracted from data? oWs captured by a cap'''''''' ture device. Each captured …

Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT

Z Zhang, F Zou, J Hong, L Chen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
At present, there is less research on the detection of broken access control vulnerabilities in
IoT systems, mostly using state machines to analyze abnormal state transitions, and no …

Sharing is caring–design and demonstration of a data privacy tool for interorganizational transfer of data

A Hussain, LA Lasrado, RR Mukkamala… - Procedia Computer …, 2021 - Elsevier
This paper presents a Data Privacy Tool (IDPT) that is designed to provide a holistic and
secure data management in organizations for handling, securing, sharing and re-sharing of …

System and method for intelligent state management

W Deninger, RPS Ahuja, LC Cheung - US Patent 8,473,442, 2013 - Google Patents
US PATENT DOCUMENTS 4,286.255. A 8/1981 Siy 4,710,957 A 12/1987 Bocci et al.
5,249,289 A 9, 1993 Thammet al. 5,465.299 A 11/1995 Matsumoto et al. 5,479,654 A …

Governance challenges for European cybersecurity policies: Stakeholder views

P Sterlini, F Massacci, N Kadenko… - IEEE Security & …, 2019 - ieeexplore.ieee.org
Governance Challenges for European Cybersecurity Policies: Stakeholder Views Page 1
CYBERSECURITY POLICY Pierantonia Sterlini and Fabio Massacci | University of Trento …

File system for a capture system

R Lowe, S Broeker, W Liu - US Patent 8,707,008, 2014 - Google Patents
5,813,009 A 9, 1998 Johnson et al. 7,293,238 B1 1 1/2007 Brook et al. 5,924,096 A* 7/1999
Draper et al.......................... 1f1 7,296,011 B2 11/2007 Chaudhuri et al. 5,943,670 A 8/1999 …