Cryptocurrency wallets: assessment and security

E Nowroozi, S Seyedshoari, Y Mekdad, E Savaş… - … for Cybersecurity in …, 2022 - Springer
Digital wallet as a software program or a digital device allows users to conduct various
transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital …

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

Y Kethepalli, R Joseph, SR Vajrala, J Vemula… - arXiv preprint arXiv …, 2023 - arxiv.org
Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and
other digital assets such as NFTs. However, these wallets are not immune to security threats …

Consumers' intention to continue using cryptocurrency mobile wallets in Malaysia

N Ghaisani, R Kannan, F Basbeth - International Journal of …, 2022 - mmupress.com
In Malaysia, over RM 800 million transactions were processed in one cryptocurrency
platform. The central bank of Malaysia has made e-payment one of its top targets to execute …

Wireless sensor networks: Security, threats, and solutions

U Inayat, F Ali, HMA Khan, SM Ali… - 2021 International …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSNs) is a rapidly growing technology that could be utilized in
almost all applications like in healthcare environment, smart homes, smart building, analysis …

Variable Generalization Evaluation of Supervised Learning Models for Detection of Spam Messages

MSS Khan, MO Akbar, H Malik… - 2021 International …, 2021 - ieeexplore.ieee.org
In the last decade, the use of mobile phones has increased dramatically, leading to new
promotions and business advertisements (Spams SMS) being sent to mobile phones …

Voice over internet protocol: Vulnerabilities and assessments

HMA Khan, U Inayat, MF Zia, F Ali… - 2021 International …, 2021 - ieeexplore.ieee.org
Voice Over Internet Protocol (VoIP) is an important technology in a network Communication
system. In the Communication System, security is an important factor. Nowadays, session …

Implementation of blockchain in healthcare: a systematic review

AK Noon, O Aziz, I Zahra… - … Conference on Innovative …, 2021 - ieeexplore.ieee.org
Blockchain is an emerging technology to ensure the security and trustworthiness for data
sharing in different areas such as the economic sector, supply chain management, food …

Facebook marketing analytics

A Wajid, MJ Awan, F Ferooz, S Shoukat… - 2021 International …, 2021 - ieeexplore.ieee.org
the social media has gained significant importance in people's life and the most pertinent
among the social media websites is Facebook. Fixed standard promotion is currently at first …

HCH DEX: A secure cryptocurrency e-wallet & exchange system with two-way authentication

M Azman, K Sharma - 2020 Third International Conference on …, 2020 - ieeexplore.ieee.org
Cryptocurrencies could potentially revolutionize the way our global economy functions. It
presents us with enticing features that could give way to a secure and safe monetary …

Rheumatoid arthritis genes classification using ML classifiers

A Sana, SA Khawaja, M Farooq - … International Conference on …, 2021 - ieeexplore.ieee.org
RA is a chronic inflammatory disease that mainly affects the joints and results in reduction in
life expectancy of 3–10 years. RA is a multi-gene disorder with a genetic component and a …