[HTML][HTML] PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow
This paper introduces a significant advancement in the Proof of Authentication (PoAh)
consensus algorithm, designed specifically for resource-constrained Internet of Things (IoT) …
consensus algorithm, designed specifically for resource-constrained Internet of Things (IoT) …
Recent Advances in Sharding Techniques for Scalable Blockchain Networks: A Review
BLY Quan, NHA Wahab, A Al-Dhaqm… - IEEE …, 2024 - ieeexplore.ieee.org
Blockchain is a technology that has been gaining popularity in the recent years thanks to its
immutability and decentralized features, various industries have started to integrate the …
immutability and decentralized features, various industries have started to integrate the …
The Role of Blockchain in Transforming Industries Beyond Finance
Blockchain technology is rapidly transforming how businesses and individuals interact. Its
inherent security features, including immutability, tamper-proofing, and verifiable data …
inherent security features, including immutability, tamper-proofing, and verifiable data …
[HTML][HTML] Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
A Padma, M Ramaiah - Results in Engineering, 2025 - Elsevier
Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the
digitization of healthcare systems. IoMT offers a revolutionary approach to healthcare …
digitization of healthcare systems. IoMT offers a revolutionary approach to healthcare …
Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator
Recently, the focus on the Internet of Things (IoT) has rocketed in parallel with the evolution
of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects …
of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects …
Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems
Securing user electronics devices has become a significant concern in the digital period,
and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep …
and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep …
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
MA Aleisa - IEEE Access, 2025 - ieeexplore.ieee.org
This research introduced a new novel “Unified Quantum-Resilient Blockchain-Zero-
Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF)” to upgrade the IoT …
Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF)” to upgrade the IoT …
[HTML][HTML] Design and Performance Analysis of a SPECK-Based Lightweight Hash Function
In recent years, hash algorithms have been used frequently in many areas, such as digital
signature, blockchain, and IoT applications. Standard cryptographic hash functions …
signature, blockchain, and IoT applications. Standard cryptographic hash functions …
Blockchain based solution for secure information sharing in pharma supply chain management
A Padma, M Ramaiah - Heliyon, 2024 - cell.com
Pharmaceutical supply chain management (PSCM) aims to alleviate logistical challenges.
However, traditional online pharma systems face issues during implementation, particularly …
However, traditional online pharma systems face issues during implementation, particularly …
RSHealth: A Ring Signature Scheme for Identity Anonymization and Transaction Privacy in Blockchain based E-Healthcare Systems
The current healthcare infrastructure faces significant challenges, including security
vulnerabilities, privacy breaches, data inconsistencies, and overly accessible health records …
vulnerabilities, privacy breaches, data inconsistencies, and overly accessible health records …