[HTML][HTML] Integrated identity and auditing management using blockchain mechanism

PM Yawalkar, DN Paithankar, AR Pabale… - Measurement …, 2023 - Elsevier
An integrated identity is a centralized identifier that makes it possible for customers to get
access to a variety of business services from a single network. The risks and assaults …

Blockchain: A survey on functions, applications and open issues

Y Lu - Journal of Industrial Integration and Management, 2018 - World Scientific
The prosperity of Bitcoin has given rise to widespread attention and in-depth research on
blockchains. The blockchain provides the fundamental technology for the decentralization …

On blockchain security and relevant attacks

J Moubarak, E Filiol, M Chamoun - 2018 IEEE Middle East and …, 2018 - ieeexplore.ieee.org
The blockchain technology witnessed a wide adoption and a swift growth in recent years.
This ingenious distributed peer-to-peer design attracted several businesses and solicited …

[HTML][HTML] A highly secure IoT firmware update mechanism using blockchain

WJ Tsaur, JC Chang, CL Chen - Sensors, 2022 - mdpi.com
Internet of Things (IoT) device security is one of the crucial topics in the field of information
security. IoT devices are often protected securely through firmware update. Traditional …

What does not fit can be made to fit! Trade-offs in distributed ledger technology designs

N Kannengießer, S Lins, T Dehling… - Proceedings of the 52nd …, 2019 - papers.ssrn.com
Distributed ledger technology (DLT), including blockchain, enables secure processing of
transactions between untrustworthy parties in a decentralized system. However, DLT is …

[HTML][HTML] A secure occupational therapy framework for monitoring cancer patients' quality of life

M Abdur Rahman, MM Rashid, J Le Kernec, B Philippe… - Sensors, 2019 - mdpi.com
Once diagnosed with cancer, a patient goes through a series of diagnosis and tests, which
are referred to as “after cancer treatment”. Due to the nature of the treatment and side effects …

On distributed ledgers security and illegal uses

J Moubarak, M Chamoun, E Filiol - Future Generation Computer Systems, 2020 - Elsevier
Distributed ledgers stimulate innovative services and enabled new applications in several
domains, creating new concepts for trust and regulation. However, this backbone that is …

Use Cases and Comparative Analysis of Blockchain Networks and Layers for DApp Development

J Gjorgjev, N Sejfuli-Ramadani… - 2024 13th …, 2024 - ieeexplore.ieee.org
This paper performs a comparative examination of well-known blockchain networks and
their corresponding layers, with a specific focus on their effectiveness and appropriateness …

Cyber-physical attacks and the value of healthcare data: facing an era of cyber extortion and organised crime

J Ibarra, H Jahankhani, S Kendzierskyj - Blockchain and Clinical Trial …, 2019 - Springer
Cybercrime has reached to a level that any cyber-attack can cause great levels of extortion.
With the support of technology, healthcare organisations have been able to enhance …

El auge de blockchain y sus posibilidades reales de aplicacion en los registros de las administraciones publicas.

M Vega Maza - IDP: Revista de Internet, Derecho y Politica, 2019 - search.ebscohost.com
La tecnología blockchain o DLT (distributed ledger technology) dota a los objetos de una
identidad digital permanente en el tiempo, al margen de su naturaleza, y ha irrumpido con …