A Review on the Use of Blockchain for the Internet of Things

TM Fernández-Caramés, P Fraga-Lamas - Ieee Access, 2018 - ieeexplore.ieee.org
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …

[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

Secure and privacy-aware blockchain design: Requirements, challenges and solutions

S Aslam, A Tošić, M Mrissa - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
During the last decade, distributed ledger solutions such as blockchain have gained
significant attention due to their decentralized, immutable, and verifiable features. However …

Blockchain-based IoT: A survey

R Thakore, R Vaghashiya, C Patel, N Doshi - Procedia computer science, 2019 - Elsevier
Abstract Blockchain and Internet of Things (IoT), two of the top disruptive technologies, are
already on their way of reshaping our future of the digital world, characterized by a drastic …

Creating a secure infrastructure for wireless diagnostics and software updates in vehicles

DK Nilsson, UE Larson, E Jonsson - … upon Tyne, UK, September 22-25 …, 2008 - Springer
A set of guidelines for creating a secure infrastructure for wireless diagnostics and software
updates in vehicles is presented. The guidelines are derived from a risk assessment for a …

Comparison studies between pre-shared and public key exchange mechanisms for transport layer security

FC Kuo, H Tschofenig, F Meyer… - … IEEE INFOCOM 2006 …, 2006 - ieeexplore.ieee.org
The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently
standardized by the IETF to extend the set of ciphersuites by utilizing existing key …

[图书][B] Handbook of wireless local area networks: applications, technology, security, and standards

M Ilyas, SA Ahson - 2005 - taylorfrancis.com
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and
Standards captures the current state of wireless LANs, and serves as the single …

Phosphorus cluster production by laser ablation

AV Bulgakov, OF Bobrenok, I Ozerov, W Marine… - Applied Physics A, 2004 - Springer
Neutral and charged phosphorus clusters of a wide size range have been produced by
pulsed laser ablation (PLA) in vacuum at 532, 337, and 193 nm ablating wavelengths and …

[HTML][HTML] 基于IBC 的TLS 握手协议设计与分析

彭长艳, 张权, 唐朝京 - 计算机应用, 2009 - joca.cn
基于IBC的TLS握手协议设计与分析 首页 期刊介绍 期刊简介 历史沿革 收录情况 获奖情况 引用
指标 编委会 期刊在线 文章推荐 过刊浏览 专辑专刊 下载排行 阅读排行 投稿指南 组稿方向 投稿 …