Self‐Sovereign Identity Solution for Blockchain‐Based Land Registry System: A Comparison

M Shuaib, NH Hassan, S Usman… - Mobile Information …, 2022 - Wiley Online Library
Providing an identity solution is essential for a reliable blockchain‐based land registry
system. A secure, privacy‐preserving, and efficient identity solution is essential but …

A Survey of Self‐Sovereign Identity Ecosystem

R Soltani, UT Nguyen, A An - Security and Communication …, 2021 - Wiley Online Library
Self‐sovereign identity is the next evolution of identity management models. This survey
takes a journey through the origin of identity, defining digital identity and progressive …

Nanoscale physical unclonable function labels based on block copolymer self-assembly

JH Kim, S Jeon, JH In, S Nam, HM Jin, KH Han… - Nature …, 2022 - nature.com
Hardware-based cryptography that exploits physical unclonable functions is required for the
secure identification and authentication of devices in the Internet of Things. However …

A survey of security in software defined networks

S Scott-Hayward, S Natarajan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The proposition of increased innovation in network applications and reduced cost for
network operators has won over the networking world to the vision of software-defined …

[图书][B] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - books.google.com
About The Book: This new edition of the cryptography classic provides you with a
comprehensive survey of modern cryptography. The book details how programmers and …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] Real-time systems: design principles for distributed embedded applications

H Kopetz, W Steiner - 2022 - books.google.com
" This book is a comprehensive text for the design of safety critical, hard real-time embedded
systems. It offers a splendid example for the balanced, integrated treatment of systems and …

Access control: principle and practice

RS Sandhu, P Samarati - IEEE communications magazine, 1994 - ieeexplore.ieee.org
Access control constrains what a user can do directly, as well as what programs executing
on behalf of the users are allowed to do. In this way access control seeks to prevent activity …

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

A pairwise key predistribution scheme for wireless sensor networks

W Du, J Deng, YS Han, PK Varshney, J Katz… - ACM Transactions on …, 2005 - dl.acm.org
To achieve security in wireless sensor networks, it is important to be able to encrypt and
authenticate messages sent between sensor nodes. Before doing so, keys for performing …