Privacy preservation of electronic health records in the modern era: A systematic survey

R Nowrozy, K Ahmed, ASM Kayes, H Wang… - ACM Computing …, 2024 - dl.acm.org
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …

Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends

B Bhushan, A Kumar, AK Agarwal, A Kumar… - Sustainability, 2023 - mdpi.com
Recent advances in machine-to-machine (M2M) communications, mini-hardware
manufacturing, and micro computing have led to the development of the Internet of Things …

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …

Blockchain based resource allocation in cloud and distributed edge computing: A survey

G Baranwal, D Kumar, DP Vidyarthi - Computer Communications, 2023 - Elsevier
Cloud computing and distributed edge computing provide computing resources to meet the
surging demands for computing caused by developments in technologies such as the …

Delegated proof of stake consensus mechanism based on community discovery and credit incentive

W Li, X Deng, J Liu, Z Yu, X Lou - Entropy, 2023 - mdpi.com
Consensus algorithms are the core technology of a blockchain and directly affect the
implementation and application of blockchain systems. Delegated proof of stake (DPoS) …

Digital Gold or Digital Security? Unravelling the Legal Fabric of Decentralised Digital Assets

C Watters - Commodities, 2023 - mdpi.com
This paper offers an in-depth exploration into the intricate world of decentralized digital
assets (DDAs), shedding light on their categorization as currencies, commodities, or …

Analyzing Miners' Dynamic Equilibrium in Blockchain Networks under DDoS Attacks

X Liu, Z Huang, Q Wang, X Jiang, Y Chen, B Wan - Electronics, 2023 - mdpi.com
Proof of work (PoW) is one of the most widely used consensus algorithms in blockchain
networks. It mainly uses the competition between mining nodes to obtain block rewards …

Countering active attacks on RAFT-based IoT blockchain networks

HM Buttar, W Aman, MMU Rahman… - IEEE Sensors …, 2023 - ieeexplore.ieee.org
This article considers an Internet-of-Things (IoT) blockchain wireless network consisting of a
leader node and various follower nodes which together implement the reliable, replicated …

Applications of blockchain technology in supply chain management

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Measures for Logistics …, 2024 - igi-global.com
In this chapter, the authors delve into the utilization of blockchain technology within the
realm of supply chain management. The emergence of blockchain technology has heralded …

Unsealing the secrets of blockchain consensus: A systematic comparison of the formal security of proof-of-work and proof-of-stake

I Abellán Álvarez, V Gramlich, J Sedlmeir - Proceedings of the 39th ACM …, 2024 - dl.acm.org
With the increasing adoption of decentralized information systems based on a variety of
permissionless blockchain networks, the choice of consensus mechanism is at the core of …