Mapping the trajectory of blockchain technology and non-fungible tokens: a comprehensive bibliometric analysis

A Kumar, N Sharma, NK Marriwala, DN Rao… - International Journal of …, 2024 - Springer
Blockchain technology and non-fungible tokens (NFTs) have lately become very popular
and attracted a lot of interest in many different fields. The historical background of these …

Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures

DH Tahayur, M Al-Zubaidie - Mesopotamian Journal of …, 2024 - mesopotamian.press
The production of digital signatures with blockchain constitutes a prerequisite for the security
of electronic agriculture applications (EAA), such as the Internet of Things (IoT). To prevent …

THC-DFECC-based privacy preserved smart contract creation for cloud data security

CS Tiwari, VK Jha - International Journal of Information Technology, 2024 - Springer
Currently, cloud services have become a novel business model for information services
owing to the rapid development of Cloud Computing (CC) technology. Hence, an efficient …

Sentiment-aware drug recommendations with a focus on symptom-condition mapping

E Anbazhagan, E Sophiya… - International Journal of …, 2024 - Springer
The adoption of digital health records and the rise of online medical forums resulted in
massive volumes of unstructured healthcare data. Most of the data used by traditional drug …

Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

L JJ, K Singh - International Journal of Information Technology, 2024 - Springer
Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending
the widely used Oyente tool is the main objective of this paper. The primary motivation stems …

Weight factor and priority-based virtual machine load balancing model for cloud computing

E Suganthi, F Kurus Malai Selvi - International Journal of Information …, 2024 - Springer
Cloud computing enables individuals and businesses to buy services as needed. Numerous
services are available through the paradigm, including online services that are easily …

Beyond Boundaries: Strengthening the Fabric of IoT Security through Blockchain Innovations

KU Nisa, HS Alqahtani, U Fatima… - … on Computing for …, 2024 - ieeexplore.ieee.org
Blockchain technology has been utilized to bypass regulations on IoT security. Blockchain
technology provides numerous benefits that can improve the security of Internet of Things …

Exploring the Effects of Block Chain-Based Security Systems on Cyber Security

R Mishra, K Kumar, SN Mehta… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Due to the rapid advancement of cyber technology, virtual property is becoming more
susceptible to hostile activity. Security structures that are mostly built on block chains …

A resilient Digital Watermarking Approach for Digital Images using Probabilistic Neural System

LR Battarusetty, S Rayalu, SV Chiranjeevi - 2024 - researchsquare.com
The Digital data and information can be distributed more easily due to the rapid expansion
in the use of individual computers, the internet, and digital multimedia technologies. The …