[HTML][HTML] A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models

A Akinbi, Á MacDermott, AM Ismael - Forensic Science International: Digital …, 2022 - Elsevier
Digital forensic examiners and stakeholders face increasing challenges during the
investigation of Internet of Things (IoT) environments due to the heterogeneous nature of the …

A secure and auditable logging infrastructure based on a permissioned blockchain

B Putz, F Menges, G Pernul - Computers & Security, 2019 - Elsevier
Abstract Information systems in organizations are regularly subject to cyber attacks targeting
confidential data or threatening the availability of the infrastructure. In case of a successful …

Chronological independently verifiable electronic chain of custody ledger using blockchain technology

X Burri, E Casey, T Bolle, DO Jaquet-Chiffelle - Forensic Science …, 2020 - Elsevier
As evidence in digital form becomes more prevalent in all kinds of investigations, there is a
pressing need for a trustworthy and transparent way to maintain electronic chain of custody …

A modified secure hash design to circumvent collision and length extension attacks

ZA Al-Odat, SU Khan, E Al-Qtiemat - Journal of Information Security and …, 2022 - Elsevier
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-
2. The proposed work produces a strengthened secure hash design using the fusion …

A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain

M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah - Symmetry, 2022 - mdpi.com
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …

Collaboration versus cheating: Reducing code plagiarism in an online MS computer science program

T Mason, A Gavrilovska, DA Joyner - Proceedings of the 50th ACM …, 2019 - dl.acm.org
We outline how we detected programming plagiarism in an introductory online course for a
master's of science in computer science program, how we achieved a statistically significant …

Blockchain in Smart Grids: A Review of Recent Developments

T Yu, F Luo, Q Wu, G Ranzi - Emerging Smart Technologies for Critical …, 2023 - Springer
As a trustworthy, decentralized ledging technology, blockchain has gained significant
attention in the industry. In the last a few years, research and development work has been …

Authenticated wireless links between a drone and sensors using a blockchain: Case of smart farming

KS Alqarni, FA Almalki, BO Soufiene… - Wireless …, 2022 - Wiley Online Library
Agriculture is confronted with several significant difficulties, such as rising air temperatures
and population growth, causing the implementation of smart farming operations as an …

‏ An Enhanced Approach to Improve the Security and Performance for Deduplication

N Almrezeq - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
Cloud service providers providing users with efficient and effective storage and transmission
of data. To reduce storage costs and save bandwidth, cloud service providers are attracted …

A new authentication procedure for client-server applications using HMAC

V Shukla, MK Misra, A Chaturvedi - Journal of discrete …, 2021 - Taylor & Francis
Hash functions are used for data integrity and authentication but unfortunately they suffer
with man in the middle attack problem. An intruder who has command over the …