Results 31 to 40 of about 2,377,005 (278)

A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics

open access: yesComplexity, 2021
Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require.
Gongzheng Liu, Jingsha He, Xinggang Xuan
doaj   +1 more source

A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain

open access: yesSymmetry, 2022
Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (CoC)
Mohamed Ali   +4 more
semanticscholar   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

Risks associated with Logistics 4.0 and their minimization using Blockchain [PDF]

open access: yes, 2020
Currently we are saying that we are at the dawn of the fourth revolution, which is marked by using cyber-physical systems and the Internet of Things. This is marked as Industry 4.0 (I4.0).
Kavka, Libor   +2 more
core   +1 more source

Dynamic Graphs on the GPU [PDF]

open access: yes, 2020
We present a fast dynamic graph data structure for the GPU. Our dynamic graph structure uses one hash table per vertex to store adjacency lists and achieves 3.4–14.8x faster insertion rates over the state of the art across a diverse set of large datasets,
Ashkiani, Saman   +3 more
core   +1 more source

A blockchain-based traceable and secure data-sharing scheme [PDF]

open access: yesPeerJ Computer Science, 2023
The traditional data-sharing model relies on a centralized third-party platform, which presents challenges such as poor transaction transparency and unsecured data security. In this article, we propose a blockchain-based traceable and secure data-sharing
Zhenqi Wang, Shaopeng Guan
doaj   +2 more sources

Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications

open access: yes, 2020
Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity.
Dorri, Ali, Jurdak, Raja
core   +1 more source

Enabling Practical IPsec authentication for the Internet [PDF]

open access: yes, 2006
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos   +3 more
core   +3 more sources

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree

open access: yesSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy