For years, combining the immutability associated with blockchain technology with the European Union’s General Data Protection Regulation (GDPR) has been considered a practically unsolvable conflict due to the very nature of blockchain and the GDPR.
Alvaro Gómez Vieites +2 more
doaj +1 more source
Trusted data flow traceability mechanism for end-to-end encrypted instant messaging platforms
While end-to-end encryption (E2EE) improves privacy in instant messaging, it complicates auditing abusive content and tracing malicious information. To address this issue, a trusted data flow traceability mechanism (TDFTM) was proposed.
XIE Rongna +5 more
doaj
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
Security analysis of the RSSP-II protocol and a novel security enhancement approach
The railway signal safety protocol-Ⅱ (RSSP-Ⅱ), as the core security communication protocol of China’s train control system (CTCS-3), played a crucial role in ensuring the security and reliability of train communication.
FENG Tao +3 more
doaj
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source
Efficient authentication system based on blockchain for E-government. [PDF]
Liu L, Omote K.
europepmc +1 more source

