A Review on the Use of Blockchain for the Internet of Things

TM Fernández-Caramés, P Fraga-Lamas - Ieee Access, 2018 - ieeexplore.ieee.org
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …

[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

Secure and privacy-aware blockchain design: Requirements, challenges and solutions

S Aslam, A Tošić, M Mrissa - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
During the last decade, distributed ledger solutions such as blockchain have gained
significant attention due to their decentralized, immutable, and verifiable features. However …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

Blockchain-based IoT: A survey

R Thakore, R Vaghashiya, C Patel, N Doshi - Procedia computer science, 2019 - Elsevier
Abstract Blockchain and Internet of Things (IoT), two of the top disruptive technologies, are
already on their way of resha** our future of the digital world, characterized by a drastic …

Creating a secure infrastructure for wireless diagnostics and software updates in vehicles

DK Nilsson, UE Larson, E Jonsson - International Conference on …, 2008 - Springer
A set of guidelines for creating a secure infrastructure for wireless diagnostics and software
updates in vehicles is presented. The guidelines are derived from a risk assessment for a …

Comparison studies between pre-shared and public key exchange mechanisms for transport layer security

FC Kuo, H Tschofenig, F Meyer… - … IEEE INFOCOM 2006 …, 2006 - ieeexplore.ieee.org
The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently
standardized by the IETF to extend the set of ciphersuites by utilizing existing key …

[หนังสือ][B] Handbook of wireless local area networks: applications, technology, security, and standards

M Ilyas, SA Ahson - 2005 - taylorfrancis.com
Consisting of 25 articles contributed by expert authors from around the world, this handbook
begins with a detailed introduction that provides an overview of LAN technologies …

Phosphorus cluster production by laser ablation

AV Bulgakov, OF Bobrenok, I Ozerov, W Marine… - Applied Physics A, 2004 - Springer
Neutral and charged phosphorus clusters of a wide size range have been produced by
pulsed laser ablation (PLA) in vacuum at 532, 337, and 193 nm ablating wavelengths and …

Changing dimensions of accountants' role and skill requirements in organisations: findings from the corporate sector in Bahrain

PL Joshi, WG Bremser - International Journal of Accounting …, 2004 - inderscienceonline.com
In a rapidly changing information technology environment, accountants' organisational roles
and skill requirements are also changing. This study examines the changing dimensions of …