Results 21 to 30 of about 91,922 (250)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval

open access: yesIET Computer Vision, EarlyView., 2022
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang   +3 more
wiley   +1 more source

Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [PDF]

open access: yesJisuanji kexue, 2022
Blockchain is one of the technical hotspots in recent years,and the research theories related to it are being enriched.However,it is still facing the key problem of small throughput and low processing efficiency before it can be implemented into the ...
LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min
doaj   +1 more source

Blockchain-Based Distributed Computing Consistency Verification for IoT Mobile Applications

open access: yesApplied Sciences, 2023
The maturation of wireless connectivity, blockchain (distributed ledger technologies), and intelligent systems has fostered a comprehensive ecosystem for the Internet of Things (IoT).
Jiahao Zhao, Yushu Zhang, Jiajia Jiang
doaj   +1 more source

A blockchain architecture with master-slave blockchain

open access: yes物联网学报, 2021
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj   +2 more sources

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

open access: yesSensors, 2023
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker   +2 more
doaj   +1 more source

Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain [PDF]

open access: yes, 2017
Many cryptocurrencies rely on Blockchain for its operation. Blockchain serves as a public ledger where all the completed transactions can be looked up. To place transactions in the Blockchain, a mining operation must be performed.
Jo, Ju-Yeon, Kim, Yoohwan
core   +3 more sources

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection

open access: yesIEEE Access, 2020
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan   +5 more
doaj   +1 more source

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Home - About - Disclaimer - Privacy