|
|
|
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ...
ver más
|
|
|
|
|
|
|
Anton Dolhopolov, Arnaud Castelltort and Anne Laurent
Analytical data platforms have been used for decades to improve organizational performance. Starting from the data warehouses used primarily for structured data processing, through the data lakes oriented for raw data storage and post-hoc data analyses, ...
ver más
|
|
|
|
|
|
|
Nicollas Rodrigues de Oliveira, Yago de Rezende dos Santos, Ana Carolina Rocha Mendes, Guilherme Nunes Nasseh Barbosa, Marcela Tuler de Oliveira, Rafael Valle, Dianne Scherly Varela Medeiros and Diogo M. F. Mattos
The COVID-19 pandemic has highlighted the necessity for agile health services that enable reliable and secure information exchange, but achieving proper, private, and secure sharing of EMRs remains a challenge due to diverse data formats and fragmented r...
ver más
|
|
|
|
|
|
|
Javid Misirli and Emiliano Casalicchio
The Internet of Things (IoT) uptake brought a paradigm shift in application deployment. Indeed, IoT applications are not centralized in cloud data centers, but the computation and storage are moved close to the consumers, creating a computing continuum b...
ver más
|
|
|
|
|
|
|
Keigo Ogata and Satoshi Fujita
The e-book services we use today have a serious drawback in that we will no longer be able to read the books we have purchased when the service is terminated. One way to solve this problem is to build a decentralized system that does not depend on a spec...
ver más
|
|
|
|
|
|
|
Pratik Thantharate and Anurag Thantharate
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders?however, traditional health data management mechanisms present interoperability, security, and privacy chall...
ver más
|
|
|
|
|
|
|
Han Gao, Zhangqin Huang, Xiaobo Zhang and Huapeng Yang
As a narrowband communication technology, long-range (LoRa) contributes to the long development of Internet of Things (IoT) applications. The LoRa gateway plays an important role in the IoT transport layer, and security and efficiency are the key issues ...
ver más
|
|
|
|
|
|
|
Khaled Almiani, Mutaz Abu Alrub, Young Choon Lee, Taha H. Rashidi and Amirmohammad Pasdar
As a critical factor in ensuring the growth of the electronic auction (e-auction) domain, the privacy and security of the participants (sellers and buyers) must always be guaranteed. Traditionally, auction data, including participant details, are stored ...
ver más
|
|
|
|
|
|
|
Vasilios Patsias, Petros Amanatidis, Dimitris Karampatzakis, Thomas Lagkas, Kalliopi Michalakopoulou and Alexandros Nikitas
Task allocation in edge computing refers to the process of distributing tasks among the various nodes in an edge computing network. The main challenges in task allocation include determining the optimal location for each task based on the requirements su...
ver más
|
|
|
|
|
|
|
Fabian Honecker, Julian Dreyer and Ralf Tönjes
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible...
ver más
|
|
|
|