|
|
|
Ali Alshehri, Mohamed Baza, Gautam Srivastava, Wahid Rajeh, Majed Alrowaily and Majed Almusali
With the advancement of cyber threats, blockchain technology has evolved to have a significant role in providing secure and reliable decentralized applications. One of these applications is a remote voting system that allow voters to participate in elect...
ver más
|
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar and Omar Alfandi
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attack...
ver más
|
|
|
|
|
|
|
Neo C. K. Yiu
Existing product anti-counterfeiting and traceability solutions across today?s internationally spanning supply chain networks are indeed developed and implemented with centralized system architecture relying on centralized authorities or intermediaries. ...
ver más
|
|
|
|
|
|
|
Louis Shekhtman and Erez Waisbard
A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trac...
ver más
|
|
|
|
|
|
|
Neo C. K. Yiu
An interesting research problem in the supply chain industry is evaluating and determining the provenance of physical goods?demonstrating the authenticity of luxury goods such as bottled wine. However, many supply chain systems and networks have been bui...
ver más
|
|
|
|
|
|
|
Klitos Christodoulou, Elias Iosif, Antonios Inglezakis and Marinos Themistocleous
The inception of Bitcoin as a peer-to-peer payment system, and its underlying blockchain data-structure and protocol, has led to an increased interest in deploying scalable and reliable distributed-ledger systems that build on robust consensus protocols....
ver más
|
|
|
|
|
|
|
Sarwar Sayeed and Hector Marco-Gisbert
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technology ...
ver más
|
|
|
|
|
|
|
Bushra Mohamed Elamin Elnaim
The following research paper is focusing on the research of online retailing adoption while challenges that are being faced in the area of system and network security. The research explores the major issues that put noticeable influence on the decision o...
ver más
|
|
|
|