|
|
|
Saleem S. Hameedi and Oguz Bayat
Over the past few years, the Internet of Things (IoT) is one of the most significant technologies ever used, as everything is connected to the Internet. Integrating IoT technologies with the cloud improves the performance, activity, and innovation of suc...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing...
ver más
|
|
|
|
|
|
|
Mihui Kim and Youngmin Kim
As a representative example for the construction of a smart city, a smart parking system has been developed in past research and implemented through IoT and cloud technologies. However, the initial installation cost of IoT sensor devices is preventing th...
ver más
|
|
|
|
|
|
|
Alessandra Tafuro, Giuseppe Dammacco and Antonio Costa
Background: Studies have highlighted how public?private partnerships are characterized by a lack of transparency, low availability of data, low accountability, and, often, strong opportunism. All these factors do not allow potential interested parties to...
ver más
|
|
|
|
|
|
|
Xuan Chen, Shujuan Tian, Kien Nguyen and Hiroo Sekiya
With data transparency and immutability, the blockchain can provide trustless and decentralized services for Internet of Things (IoT) applications. However, most blockchain-IoT networks, especially those with a private blockchain, are built on top of an ...
ver más
|
|
|
|
|
|
|
Tetiana Momot, Daniele Tumietto, Roman Teslenko
Pág. 137 - 145
The subject matter of the article is the substantiation of the problems and perspectives of the introduction of Distributed Ledger Technologies (DLT) / Blockchain in the public and private sectors as a modern digital economy instrument. The goal of the w...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Faten Chaabane, Jalel Ktari, Tarek Frikha and Habib Hamam
With the onset of the COVID-19 pandemic and the succession of its waves, the transmission of this disease and the number of deaths caused by it have been increasing. Despite the various vaccines, the COVID-19 virus is still contagious and dangerous for a...
ver más
|
|
|
|
|
|
|
Seungeun Kim, Joohyung Kim and Dongsoo Kim
As the population structure changes due to lower fertility rates and rapid aging, the blood supply available for blood transfusion decreases and demand increases. In most countries, blood management information systems, led by national institutions, oper...
ver más
|
|
|
|
|
|
|
Sergey Alekseev
Pág. 38 - 43
The article is devoted to the investigation of the prospects of using innovative intelligent technologies in modern transport systems. Special attention is paid to the prospects of the development of transport infrastructure, in particular, the construct...
ver más
|
|
|
|
|
|
|
Nikolaos Kapsoulis, Alexandros Psychas, Georgios Palaiokrassas, Achilleas Marinakis, Antonios Litke, Theodora Varvarigou, Charalampos Bouchlis, Amaryllis Raouzaiou, Gonçal Calvo and Jordi Escudero Subirana
Private and permissioned blockchains are conceptualized and mostly assembled for fulfilling corporations? demands and needs in the context of their own premises. This paper presents a complete and sophisticated end-to-end permissioned blockchain applicat...
ver más
|
|
|
|
|
|
|
Nicollas Rodrigues de Oliveira, Yago de Rezende dos Santos, Ana Carolina Rocha Mendes, Guilherme Nunes Nasseh Barbosa, Marcela Tuler de Oliveira, Rafael Valle, Dianne Scherly Varela Medeiros and Diogo M. F. Mattos
The COVID-19 pandemic has highlighted the necessity for agile health services that enable reliable and secure information exchange, but achieving proper, private, and secure sharing of EMRs remains a challenge due to diverse data formats and fragmented r...
ver más
|
|
|
|
|
|
|
Lucas Mayr, Lucas Palma, Gustavo Zambonin, Wellington Silvano and Ricardo Custódio
Private key management is a complex obstacle arising from the traditional public key infrastructure model. However, before any related security breach can be addressed, it must first be reliably detected. Certificate Transparency (CT) is an example of a ...
ver más
|
|
|
|
|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
|
Karam Eddine Bilami and Pascal LORENZ
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their...
ver más
|
|
|
|
|
|
|
Jacopo Fior, Luca Cagliero and Paolo Garza
In the last decade, cryptocurrency trading has attracted the attention of private and professional traders and investors. To forecast the financial markets, algorithmic trading systems based on Artificial Intelligence (AI) models are becoming more and mo...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Yuan Zhou and Tao Feng
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc...
ver más
|
|
|
|
|
|
|
Maryam Pahlevan and Valentin Ionita
In recent years, sharing threat information has been one of the most suggested solutions for combating the ever-increasing number of cyberattacks, which stem from the system-wide adoption of Information and Communication Technology (ICT) and consequently...
ver más
|
|
|
|
|
|
|
Yangheran Piao, Kai Ye and Xiaohui Cui
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished fina...
ver más
|
|
|
|
|
|
|
Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel
This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health...
ver más
|
|
|
|