RR Brooks, KC Wang, L Yu, J Oakley… - IEEE Blockchain in …, 2018 - blockchain.ieee.org
The recent popularity of cryptocurrencies has highlighted the versatility and applications of a decentralized, public blockchain. Blockchains provide a data structure that can guarantee …
The development of Cloud processing and 'Big Data'have raised many concerns over the use to which data is being put. These concerns have created new demands for …
Blockchains have gained popularity due to their versatility and wide range of application. Blockchains are a decentralized data structure guaranteeing integrity and non-repudiation of …
J Oakley, C Worley, L Yu, RR Brooks, İ Özçelik… - Digital threats: research …, 2023 - dl.acm.org
Clinical trials are a multi-billion-dollar industry. One of the biggest challenges facing the clinical trial research community is satisfying Part 11 of Title 21 of the Code of Federal …
With the rapid increase of data breaches, preserving user privacy and ensuring security are essential properties of distributed systems. The work done in this dissertation provides …
AM Sychov, NA Sukhorukova, DA Kholod - CEUR Workshop …, 2017 - ceur-ws.org
Constant perfection of methods of unauthorized access to information, as well as significant damage to this kind of action resulted in a focused and systematic improvement of …
The origin and integrity of data is a concept that is of great importance. If the history of the data is not preserved, there is no way to ascertain data integrity and whether it was modified; …
Network traffic analysis is using metadata to infer information from traffic flows. Network traffic flows are the tuple of source IP, source port, destination IP, and destination port …
KP Kumar, CR Chowdary - Journal of Computational and …, 2020 - ingentaconnect.com
Access control is one of the important element in providing confidentiality to the secured data. Access specifiers helps us understand degree of rights given to the users in utilizing …