Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan +5 more
doaj +1 more source
Blockchain and cloud computing-based secure electronic healthcare records storage and sharing
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat +6 more
doaj +1 more source
Quantum-secure message authentication via blind-unforgeability [PDF]
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett +17 more
core +3 more sources
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris +2 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications [PDF]
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment.
Maitreyi Ponguwala, DR.Sreenivasa Rao
doaj +1 more source
Quantum Tokens for Digital Signatures [PDF]
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The
Ben-David, Shalev, Sattath, Or
core +2 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim +5 more
doaj +1 more source
SL2 homomorphic hash functions: Worst case to average case reduction and short collision search [PDF]
We study homomorphic hash functions into SL(2,q), the 2x2 matrices with determinant 1 over the field with $q$ elements. Modulo a well supported number theoretic hypothesis, which holds in particular for concrete homomorphisms proposed thus far, we ...
Mullan, Ciaran, Tsaban, Boaz
core +2 more sources

