Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams

NZ Aitzhan, D Svetinovic - IEEE transactions on dependable …, 2016 - ieeexplore.ieee.org
Smart grids equipped with bi-directional communication flow are expected to provide more
sophisticated consumption monitoring and energy trading. However, the issues related to …

Network security: current status and future directions

C Douligeris, DN Serpanos - 2007 - books.google.com
A unique overview of network security issues, solutions, and methodologies at an
architectural and research level Network Security provides the latest research and …

Data-driven analysis of bitcoin properties: exploiting the users graph

D Di Francesco Maesa, A Marino, L Ricci - International Journal of Data …, 2018 - Springer
Data analytic has recently enabled the uncovering of interesting properties of several
complex networks. Among these, it is worth considering the bitcoin blockchain, because of …

Using blockchain for improved video integrity verification

S Ghimire, JY Choi, B Lee - IEEE Transactions on Multimedia, 2019 - ieeexplore.ieee.org
A video record plays a crucial role in providing evidence for crime scenes or road accidents.
However, the main problem with the video record is that it is often vulnerable to various …

Authenticated semi-quantum direct communication protocols using Bell states

YP Luo, T Hwang - Quantum Information Processing, 2016 - Springer
This study presents the first two authenticated semi-quantum direct communication protocols
without using any classical channel. By pre-sharing a master secret key between two …

Light weight cryptographic algorithms for medical internet of things (IoT)-a review

DJ Rani, SE Roslin - 2016 Online international conference on …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) is communication between smart objects and human. It finds
enormous applications in the field of healthcare monitoring, information management …

Reduction of network retrieval latency using cache and digest

JC Mogul - US Patent 7,315,884, 2008 - Google Patents
A system and method for comparing a digest value in an incoming response to a digest
index (eg, a hash table). The digest index includes digest values of data objects already …

Efficient quantum dialogue using single photons

YP Luo, CY Lin, T Hwang - Quantum information processing, 2014 - Springer
This work proposes a quantum dialogue (QD) based on single photons, which not only
allows two communicants to exchange their secret messages simultaneously via a one-step …

Validation protocol and system

S Walmsley, P Lapstun - US Patent App. 10/203,559, 2003 - Google Patents
This invention is a validation protocol for determining whether an untrusted authentication
chip is valid, or not. In another aspect it concerns a validation System for the protocol. The …

Consumable authentication protocol and system

SR Walmsley - US Patent 6,816,968, 2004 - Google Patents
Manufacturers of Systems that require consumables, Such as a laser printer that requires
toner cartridges, have Struggled with the problem of authenticating consumables, to varying …