[HTML][HTML] A survey on zero-knowledge authentication for internet of things

Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …

Generalized autonomous path proxy re-encryption scheme to support branch functionality

Z Lin, J Zhou, Z Cao, X Dong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy Re-Encryption (PRE), a special cryptographic primitive, can efficiently perform
ciphertext conversion on the cloud. To enable the data owner (ie delegator) to authorize a …

[HTML][HTML] Research on data transaction security based on blockchain

Y Jiang, G Sun, T Feng - Information, 2022 - mdpi.com
With the increasing value of various kinds of data in the era of big data, the demand of
different subjects for data transactions has become more and more urgent. In this paper, a …

Data Marketplaces: Best Practices, Challenges, and Advancements for Embedded Finance

A Kiourtis, A Mavrogiorgou, G Makridis… - … Computing in Smart …, 2023 - ieeexplore.ieee.org
Data leads to knowledge, being considered crucial for running a successful business. Its
production is dramatically increasing, generating challenges into identifying what data is …

SECURE ROAD TRAFFIC MANAGEMENT (SRTM) SYSTEM FOR TRAFFIC VIOLATION DETECTION AND RECORDING USING BLOCKCHAIN TECHNOLOGY

MH Omar, IATF Taj-Eddin, NM Omar… - Journal of Southwest …, 2024 - jsju.org
Traffic road violations are increasing continuously in crowded and big cities, which requires
an automatic system for monitoring and detecting. This system should be accurate and …