[HTML][HTML] A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review …

U Khalil, OA Malik, M Uddin, CL Chen - Sensors, 2022‏ - mdpi.com
Smart devices have become an essential part of the architectures such as the Internet of
Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast …

A comprehensive formal security analysis of OAuth 2.0

D Fett, R Küsters, G Schmitz - Proceedings of the 2016 ACM SIGSAC …, 2016‏ - dl.acm.org
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023‏ - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions

U Khalil, OA Malik, S Hussain - IEEE Access, 2022‏ - ieeexplore.ieee.org
The mechanisms based on the distributed environment have become an obvious choice for
solutions, while they have not been limited only to a specific domain (ie, crypto-currency) …

A blockchain-based secure data-sharing framework for software defined wireless body area networks

K Hasan, MJM Chowdhury, K Biswas, K Ahmed… - Computer Networks, 2022‏ - Elsevier
In the past few years, blockchain has proven its necessity and unprecedented prospects in
providing a secure environment for information exchange between two parties. The …

Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services

R Wang, S Chen, XF Wang - 2012 IEEE Symposium on …, 2012‏ - ieeexplore.ieee.org
With the boom of software-as-a-service and social networking, web-based single sign-on
(SSO) schemes are being deployed by more and more commercial websites to safeguard …

A thermal-driven floorplanning algorithm for 3D ICs

J Cong, J Wei, Y Zhang - IEEE/ACM International Conference …, 2004‏ - ieeexplore.ieee.org
As the technology progresses, interconnect delays have become bottlenecks of chip
performance. 3D integrated circuits are proposed as one way to address this problem …

Oauth demystified for mobile application developers

EY Chen, Y Pei, S Chen, Y Tian, R Kotcher… - Proceedings of the 2014 …, 2014‏ - dl.acm.org
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …

New privacy issues in mobile telephony: fix and verification

M Arapinis, L Mancini, E Ritter, M Ryan… - Proceedings of the …, 2012‏ - dl.acm.org
Mobile telephony equipment is daily carried by billions of subscribers everywhere they go.
Avoiding linkability of subscribers by third parties, and protecting the privacy of those …

A survey on decentralized identifiers and verifiable credentials

C Mazzocca, A Acar, S Uluagac, R Montanari… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Digital identity has always been considered the keystone for implementing secure and
trustworthy communications among parties. The ever-evolving digital landscape has gone …