Proof of delivery smart contract for performance measurements
The growth of the enterprise blockchain research supporting supply chain management
calls for investigations of their impact and mindfulness of their design, use cases, and pilots …
calls for investigations of their impact and mindfulness of their design, use cases, and pilots …
Detecting internet of things bots: A comparative study
Since the Mirai botnet attacks in 2016 research into the Internet of Things (IoT) botnet
malware has increased substantially. IoT botnet relevant threats continue to rise, impacting …
malware has increased substantially. IoT botnet relevant threats continue to rise, impacting …
[HTML][HTML] Secure decentralized firmware update delivery service for Internet of Things
YE Oktian, U Jo, AMA Laksmono, H Kim - Internet of Things, 2024 - Elsevier
With the increasing number of Internet of Things devices, it is crucial to keep them up-to-date
to prevent cyber attacks. Traditional centralized delivery is not suitable for scaling and also …
to prevent cyber attacks. Traditional centralized delivery is not suitable for scaling and also …
Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing
Smart devices are considered as an integral part of Internet of Things (IoT), have an aim to
make a dynamic network to exchange information, collect data, analysis, and make optimal …
make a dynamic network to exchange information, collect data, analysis, and make optimal …
Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks
X Hu, J Yin, G Cheng, J Gong, L Yang… - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
Due to its efficiency, low overhead, and high scalability, consortium blockchain has been
deeply applied in various fields of society. Order financing is one of the scenarios of …
deeply applied in various fields of society. Order financing is one of the scenarios of …
Towards Decentralized Operationalization of Zero Trust Architecture
Towards Decentralized Operationalization of Zero Trust Architecture Page 1 P osted on 10 F eb
2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/techrxiv.19127090.v1 — e-Prin ts p osted on T …
2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/techrxiv.19127090.v1 — e-Prin ts p osted on T …
On the internet of things
The Internet of Things (IoT) is a hot IT topic these days. However, there is confusion as to
whether the IoT is anything new and how it works. The IoT is in essence a network of smart …
whether the IoT is anything new and how it works. The IoT is in essence a network of smart …
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment
This paper proposes Patchman, a firmware binary delivery service for the Internet of Things
ecosystem leveraging blockchain. When a new firmware patch is available, vendors make a …
ecosystem leveraging blockchain. When a new firmware patch is available, vendors make a …
Estimation of Crypto Net Worth using Zero Knowledge Proof
K Joshi, K Binjola, R Bondale… - … on Advances in …, 2023 - ieeexplore.ieee.org
The bane of cryptocurrency wallets is that there are too many of them. Many wallets support
only a few individual currencies or a set of currencies. They are preferred over generic …
only a few individual currencies or a set of currencies. They are preferred over generic …
Two-Level Secure Framework for Authentication System for Embedded Systems
Due to the enhanced capacity of adversaries, automated systems are dynamically
powerless against privacy and counterfeiting. Currently, most counterfeit systems are based …
powerless against privacy and counterfeiting. Currently, most counterfeit systems are based …