Emerging iot applications in sustainable smart cities for covid-19: Network security and data preservation challenges with future directions

M Adil, MK Khan - Sustainable Cities and Society, 2021 - Elsevier
COVID-19 is a global infectious disease that can be easily spread by the contiguity of
infected people. To prevent from COVID-19 and reduce its impact in sustainable smart cities …

[HTML][HTML] Review of offline payment function of CBDC considering security requirements

Y Chu, J Lee, S Kim, H Kim, Y Yoon, H Chung - Applied sciences, 2022 - mdpi.com
Due to the growth of the internet and communication technologies, electronic financial
systems are becoming popular. Physical cash is losing its preeminence, and digital numbers …

A blockchain-based nonrepudiation network computing service scheme for industrial IoT

Y Xu, J Ren, G Wang, C Zhang, J Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Emerging network computing technologies extend the functionalities of industrial IoT (IIoT)
terminals. However, this promising service-provisioning scheme encounters problems in …

Overview of security issues in vehicular ad-hoc networks

JM De Fuentes, AI González-Tablas… - Handbook of research …, 2011 - igi-global.com
Vehicular ad-hoc networks (VANETs) are a promising communication scenario. Several new
applications are envisioned, which will improve traffic management and safety …

[PDF][PDF] BAR gossip

HC Li, A Clement, EL Wong, J Napper, I Roy… - Proceedings of the 7th …, 2006 - usenix.org
Gossip relies on verifiable pseudo-random partner selection to eliminate non-determinism
that can be used to game the system while maintaining the robustness and rapid …

Opening a Pandora's box: things you should know in the era of custom GPTs

G Tao, S Cheng, Z Zhang, J Zhu, G Shen… - arxiv preprint arxiv …, 2023 - arxiv.org
The emergence of large language models (LLMs) has significantly accelerated the
development of a wide range of applications across various fields. There is a growing trend …

On security in publish/subscribe services: A survey

C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …

[LLIBRE][B] SOA—Standards & Technology

M Hafner, R Breu - 2009 - Springer
This chapter gives a brief overview of paradigms, technologies and standards that represent
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …

An abuse-free fair contract signing protocol based on the RSA signature

G Wang - Proceedings of the 14th international conference on …, 2005 - dl.acm.org
A fair contract signing protocol allows two potentially mistrusted parities to exchange their
commitments (ie, digital signatures) to an agreed contract over the Internet in a fair way, so …

Transparent personal data processing: The road ahead

P Bonatti, S Kirrane, A Polleres, R Wenning - Computer Safety, Reliability …, 2017 - Springer
Abstract The European General Data Protection Regulation defines a set of obligations for
personal data controllers and processors. Primary obligations include: obtaining explicit …