Blockchain technology: security issues, healthcare applications, challenges and future trends

Z Wenhua, F Qamar, TAN Abdali, R Hassan, STA Jafri… - Electronics, 2023 - mdpi.com
Blockchain technology provides a data structure with inherent security properties that
include cryptography, decentralization, and consensus, which ensure trust in transactions. It …

Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

What should 6G be?

S Dang, O Amin, B Shihada, MS Alouini - Nature Electronics, 2020 - nature.com
The standardization of fifth generation (5G) communications has been completed, and the
5G network should be commercially launched in 2020. As a result, the visioning and …

A survey of blockchain technology applied to smart cities: Research issues and challenges

J Xie, H Tang, T Huang, FR Yu, R Xie… - … surveys & tutorials, 2019 - ieeexplore.ieee.org
In recent years, the rapid urbanization of world's population causes many economic, social,
and environmental problems, which affect people's living conditions and quality of life …

Blockchain technology overview

D Yaga, P Mell, N Roby, K Scarfone - arXiv preprint arXiv:1906.11078, 2019 - arxiv.org
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a
distributed fashion (ie, without a central repository) and usually without a central authority …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

Scalable, transparent, and post-quantum secure computational integrity

E Ben-Sasson, I Bentov, Y Horesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Human dignity demands that personal information, like medical and forensic data, be hidden
from the public. But veils of secrecy designed to preserve privacy may also be abused to …

[PDF][PDF] 区块链安全问题: 研究现状与展望

韩璇, 袁勇, 王飞跃 - 自动化学报, 2019 - impcia.net
摘要区块链是比特币底层的核心技术, 展示了在自组织模式下实现大规模协作的巨大潜力,
为解决分布式网络中的一致性问题提供了全新的方法. 随着比特币的广泛流通和去中心化区块链 …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …