A Review on the Use of Blockchain for the Internet of Things

TM Fernández-Caramés, P Fraga-Lamas - Ieee Access, 2018 - ieeexplore.ieee.org
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …

A review on blockchain technologies for an advanced and cyber-resilient automotive industry

P Fraga-Lamas, TM Fernández-Caramés - IEEE access, 2019 - ieeexplore.ieee.org
In the last century, the automotive industry has arguably transformed society, being one of
the most complex, sophisticated, and technologically advanced industries, with innovations …

Blockchain-based IoT: A survey

R Thakore, R Vaghashiya, C Patel, N Doshi - Procedia computer science, 2019 - Elsevier
Abstract Blockchain and Internet of Things (IoT), two of the top disruptive technologies, are
already on their way of reshaping our future of the digital world, characterized by a drastic …

Privacy amplification of entanglement parametric-down conversion based quantum key distribution via quantum logistic map for photon bases choice

M Tchoffo, AG Tene - Chaos, Solitons & Fractals, 2020 - Elsevier
This paper proposes a new quantum key distribution (QKD) protocol, namely the pseudo-
random bases entangled-photons based QKD (PRB-EPQKD) protocol. The latest mainly …

区块链关键技术及存在问题研究综述.

刘双印, 王璐, 孙傅恒, 徐龙琴, 曹亮… - Journal of …, 2022 - search.ebscohost.com
区块链是基于数字加密货币基础上发展而来的分布式数据库技术, 区块链系统具有去中心化,
不可篡改, 高度自治, 分布共识等特点, 为无需第三方监管实现分布式一致性问题提供了解决方案 …

Comparative analysis on the performance of selected security algorithms in cloud computing

RS Cordova, RLR Maata, AS Halibas… - … on Electrical and …, 2017 - ieeexplore.ieee.org
Computer systems security plays a critical role in ensuring the confidentiality, integrity and
data protection of electronic resources in a workplace. However, most web information …

[PDF][PDF] Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries

DF Pigatto, NBF da Silva… - Journal of Applied …, 2011 - academia.edu
This paper presents a comparison between two implementations of the elliptic curve
cryptography (ECC) algorithm based on El-Gamal. Each implementation uses different …

[PDF][PDF] Novel approaches to enhance mobile WiMAX security

T Shon, B Koo, JH Park, H Chang - EURASIP Journal on Wireless …, 2010 - Springer
Abstract The IEEE 802.16 Working Group on Broadband Wireless Access Standards
released IEEE 802.16-2004 which is a standardized technology for supporting broadband …

Mobile WiMAX network security threats and solutions: A survey

VK Jatav, V Singh - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of
WiMAX such as high speed internet facility over a long distance, quality of service …

A secured and authenticated internet of things model using blockchain architecture

KP Satamraju, B Malarkodi - 2019 TEQIP III Sponsored …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has created huge vibes in the technology arena. It has been pivotal
in providing cutting-edge solutions in diversified fields. Few applications include smart …