Results 111 to 120 of about 2,695,884 (227)

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Blockchain enabled traceability in the jewel supply chain. [PDF]

open access: yesSci Rep
Patel A   +4 more
europepmc   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj  

Home - About - Disclaimer - Privacy