|
|
|
Sandro Pullo, Remo Pareschi, Valentina Piantadosi, Francesco Salzano and Roberto Carlini
Addressing the critical challenges of resource inefficiency and environmental impact in the agrifood sector, this study explores the integration of Internet of Things (IoT) technologies with IOTA?s Tangle, a Distributed Ledger Technology (DLT). This inte...
ver más
|
|
|
|
|
|
|
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ...
ver más
|
|
|
|
|
|
|
Leny Vinceslas, Safak Dogan, Srikumar Sundareshwar and Ahmet M. Kondoz
By design, distributed ledger technologies persist low-level data, which makes conducting complex business analysis of the recorded operations challenging. Existing blockchain visualization and analytics tools such as block explorers tend to rely on this...
ver más
|
|
|
|
|
|
|
Johannes Rude Jensen,Henrik Axelsen,Omri Ross
Pág. 92 - 103
Today, local financial institutions are responsible for submitting compliance reporting data to the supervisory authorities. This is commonly referred to as the ?push model?. The increasing complexity of reporting obligations often results in delayed rep...
ver más
|
|
|
|
|
|
|
Muntadher Sallal, Ruairí de Fréin and Ali Malik
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ...
ver más
|
|
|
|
|
|
|
Reza Soltani, Marzia Zaman, Rohit Joshi and Srinivas Sampalli
With the success of Bitcoin and the introduction of different uses of Blockchain, such as smart contracts in Ethereum, many researchers and industries have turned their attention to applications that use this technology. In response to the advantages and...
ver más
|
|
|
|
|
|
|
Flavio Pinto, Yogachandran Rahulamathavan and James Skinner
Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizations ...
ver más
|
|
|
|
|
|
|
Nkhulang T. Matsepe,Elma van der Lingen
AbstractPurpose: The fourth industrial revolution (4IR) enables firms to leverage various emerging technologies to reduce operating costs, improve business efficiencies and gain competitive advantage. This article uncovers the determinants influencing em...
ver más
|
|
|
|
|
|
|
Fabian Honecker, Julian Dreyer and Ralf Tönjes
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible...
ver más
|
|
|
|
|
|
|
Haifa Alanzi and Mohammad Alkhatib
An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users? personal data. Tradi...
ver más
|
|
|
|