Blockchain for decentralization of internet: prospects, trends, and challenges

J Zarrin, H Wen Phang, L Babu Saheer, B Zarrin - Cluster Computing, 2021 - Springer
Blockchain has made an impact on today's technology by revolutionizing the financial
industry through utilization of cryptocurrencies using decentralized control. This has been …

A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security

A Sundararajan, A Chavan, D Saleem, AI Sarwat - Energies, 2018 - mdpi.com
The increasing proliferation of distributed energy resources (DERs) on the smart grid has
made distributed solar and wind two key contributors to the expanding attack surface of the …

[PDF][PDF] Security model for TCP/IP protocol suite

MA Kumar, S Karthikeyan - Journal of Advances in Information Technology, 2011 - jait.us
the Internet has instantly evolved into a vast global network in the growing technology.
TCP/IP Protocol Suite is the basic requirement for today's Internet. Internet usage continues …

Architecture, Ability, and Adaptability of Recursive Internetworking Architecture-A Review

BS Neelam, BA Shimray - Recent Advances in Computer …, 2022 - ingentaconnect.com
The ever-increasing dependency of the utilities on networking brought several cyber
vulnerabilities and burdened them with dynamic networking demands like QoS …

Hiding and Exposing Messages by Covert Channel Features

H Alwadi, M Hammad - … on Data Analytics for Business and …, 2021 - ieeexplore.ieee.org
a covert channel is a dangerous communication channel classified as an invisible and
undetected security attack. Furthermore, in the different networks, there are several concerns …

[PDF][PDF] A New Security Architecture for TCP/IP Protocol Suite

MA Kumar, S Karthikeyan - International Journal of Advanced …, 2010 - researchgate.net
With the rapid growth and usage of Internet, network security becomes a major issue in the
field of research. TCP and IP are the two protocols, which is basis for today's Internet. IPv4 is …

A New 512 Bit Cipher for Secure Communication

MA Kumar, S Karthikeyan - International Journal of Computer …, 2012 - search.proquest.com
The internet today is being used by millions of users for a large variety of commercial and
non commercial purposes. It is controlled by different entities. It is mainly used as an efficient …

[PDF][PDF] HYBRID SECURITY ARCHITECTURE FOR DATA COMMUNICATIONS (SADC).

T Aregay, MA Kumar - … Journal of Advanced Research in Computer …, 2018 - academia.edu
Communication networks and Internet had a tremendous growth in the recent past years.
Today most of the government sectors, financial institutions, corporations, military and others …

[图书][B] Context-Aware, Service-Sharing, Generic Smart-Computing Environment

HJC Van der Westhuizen - 2018 - search.proquest.com
This dissertation aims to describe a context-aware, service-sharing, generic smart-
computing environment that uses a model to create a local network profile of all connected …

[PDF][PDF] Security for Mobile Application and Its Data Outsourcing in the Cloud Infrastructure

BE Nyamajeje, H Yu - Proceedings of the International MultiConference of …, 2016 - iaeng.org
On the tight constraints in the mobile devices environment, individuals and enterprises are
shifting from on-premise solutions to on-demand cloud-based services. More and more …