|
|
|
Widya Nita Suliyanti and Riri Fitri Sari
A Practical Byzantine Fault Tolerance (PBFT) is a consensus algorithm deployed in a consortium blockchain that connects a group of related participants. This type of blockchain suits the implementation of the Building Information Modeling (BIM) informati...
ver más
|
|
|
|
|
|
|
Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a co...
ver más
|
|
|
|
|
|
|
Rui Morais, Paul Crocker and Valderi Leithardt
This paper presents the research undertaken with the goal of designing a consensus algorithm for cryptocurrencies with less latency than the current state-of-the-art while maintaining a level of throughput and scalability sufficient for real-world paymen...
ver más
|
|
|
|
|
|
|
Jishu K. Medhi, Rui Liu, Qianlong Wang and Xuhui Chen
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) a...
ver más
|
|
|
|
|
|
|
Huanliang Xiong, Muxi Chen, Canghai Wu, Yingding Zhao and Wenlong Yi
Blockchain technology can solve the problem of trust in the open network in a decentralized way. It has broad application prospects and has attracted extensive attention from academia and industry. The blockchain consensus algorithm ensures that the node...
ver más
|
|
|
|
|
|
|
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent...
ver más
|
|
|
|
|
|
|
Nur Arifin Akbar, Amgad Muneer, Narmine ElHakim and Suliman Mohamed Fati
Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes...
ver más
|
|
|
|
|
|
|
Qian Qu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved
Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation int...
ver más
|
|
|
|
|
|
|
Shabir Ahmad Sofi, Roohie Naaz
Pág. 113 - 118
Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited re...
ver más
|
|
|
|
|
|
|
Vitor Nazário Coelho, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang and Igor Machado Coelho
Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios wher...
ver más
|
|
|
|