|
|
|
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t...
ver más
|
|
|
|
|
|
Abhay Singh, Ankush Ganesh, Rutuja Rajendra Patil, Sumit Kumar, Ruchi Rani and Sanjeev Kumar Pippal
Voting is a democratic process that allows individuals to choose their leaders and voice their opinions. However, the current situation with physical voting involves long queues, paper-based ballots, and security challenges. Blockchain-based voting model...
ver más
|
|
|
|
|
|
Joshua H. Tyler, Mohamed K. M. Fadul and Donald R. Reising
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of atten...
ver más
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|