45   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb    
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo    
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the cha... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ahlam Fakieh and Aymen Akremi    
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sarwar Sayeed and Hector Marco-Gisbert    
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technology ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris and Georgios Theodoridis    
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid    
Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. However,... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam    
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by milli... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fatemeh Stodt and Christoph Reich    
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren    
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Atef Ghalwesh,Shimaa Ouf,Amr Sayed     Pág. 166 - 173
Nowadays the world discuss the problem of the cryptocurrency and shows several risks in dealing with this new investment or banning it by governments and the main issue of this paper is how can the third part ex: (exchange market for trading cryptocurren... ver más
Revista: International Journal of Economics and Financial Issues    Formato: Electrónico

 
en línea
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang    
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nur Arifin Akbar, Amgad Muneer, Narmine ElHakim and Suliman Mohamed Fati    
Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Cristina Regueiro, Iñaki Seco, Iván Gutiérrez-Agüero, Borja Urquizu and Jason Mansell    
Audit logs are a critical component in today?s enterprise business systems as they provide several benefits such as records transparency and integrity and security of sensitive information by creating a layer of evidential support. However, current imple... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck    
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid    
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Moez Krichen    
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a blockchain. Despite the fact that they offer numerous advantages, such as automation and transparency, they are susceptible to a variety of assaults due to their com... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Surjit Singh, Vivek Mehla and Srete Nikolovski    
As information technology advances quickly, so does the 5G?6G network management system, which is moving toward greater integration, decentralization, diversity, and intelligence. As flexibility is a crucial criterion for 5G?6G network architecture, we u... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Karam Eddine Bilami and Pascal LORENZ    
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »