Exploring Blockchain and Supply Chain Integration: State-of-the-Art, Security Issues and Emerging Directions

U Agarwal, V Rishiwal, M Yadav, M Aslhammari… - IEEE …, 2024 - ieeexplore.ieee.org
The growing complexities in supply chain management, driven by internationalization,
decentralization, and modernization, are increasingly threatened by data breaches, network …

[HTML][HTML] Emerging Authentication Technologies for Zero Trust on the Internet of Things

C Bast, KH Yeh - Symmetry, 2024 - mdpi.com
The large and interconnected nature of the Internet of Things (IoT) presents unique security
challenges, even as it revolutionizes various sectors. With numerous devices, often limited in …

[PDF][PDF] Unlocking Privacy in Blockchain: Exploring Zero-Knowledge Proofs and Secure Multi-Party Computation Techniques

CGMA Gilbert - GSJ, 2024 - academia.edu
As blockchain technology continues to evolve, the pursuit of privacy has become a
significant challenge. Although the transparency and immutability of blockchain are …

[HTML][HTML] Zero Trust Cybersecurity: Procedures and Considerations in Context

BD Lund, TH Lee, Z Wang, T Wang, NR Mannuru - Encyclopedia, 2024 - mdpi.com
Definition In response to the increasing complexity and sophistication of cyber threats,
particularly those enhanced by advancements in artificial intelligence, traditional security …

Securing IoT with Resilient Cloud-Edge Continuum

E Zeydan, AK Yadav, P Ranaweera… - … and Services (ICCNS), 2024 - ieeexplore.ieee.org
In the era of 6G, securing the computing continuum, which includes cloud, edge and IoT
infrastructures, is a major challenge. This paper addresses these challenges by presenting a …

Cybersecurity Measures for Protecting Data

KI Adeyinka, TI Adeyinka - … Privacy and Security Difficulties in Social …, 2025 - igi-global.com
The base of this chapter rests on the basics of fundamental concepts and modern
cryptography techniques and their use in secure communication systems. Moreover, apart …

[PDF][PDF] Security in the Internet of Things: Identifying and Analysing Critical Categories

H Sebestyen, DE Popescu, RD Zmaranda - 2024 - preprints.org
With the proliferation of IoT-based applications, security requirements are becoming
increasingly stringent. Given the diversity of such systems, choosing the most appropriate …

[PDF][PDF] Securing Amazon Web Services with Zero Trust Architecture

S Jaiswal - 2024 - ntnuopen.ntnu.no
Securing cloud infrastructure has become a crucial priority for or-ganizations worldwide in
the rapidly evolving technological landscape. As businesses increasingly depend on cloud …

Asynchronous Federated Learning Based Zero Trust Architecture for the Next Generation Industrial Control Systems

F Lv, H Wang, Z Pan, R Sun, S Si, W Zhang… - Available at SSRN … - papers.ssrn.com
The zero-trust architecture (ZTA) is considered an up-and-coming technology for achieving
security in next-generation industrial control systems (ICSs). However, ICSs are intricated …