A systematic literature review on sensitive data protection in blockchain applications

S Khanum, K Mustafa - Concurrency and Computation …, 2023 - Wiley Online Library
Since inception, blockchain has earned significant attention due to its exclusive
characteristics and advantages. It has changed the way the transactions are conducted by …

Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems

Z Yan, H Qu, X Zhang, JL Xu, XJ Lin - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based anonymous messaging systems have been widely utilized in covert
conversations to enable people to anonymously exchange encrypted data in public using …

A Bilateral Access Control Data Sharing Scheme for Internet of Vehicles

X Hu, L Wang, L Gu, Y Ning - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Data sharing among vehicles can effectively address the traffic congestion and accidents
caused by the increasing number of vehicles, thereby enhancing traffic efficiency and the …

XAutn: Blockchain-based cross domain authentication for digital certificates in the education sector

SB Priya, PS Rani, SP Chokkalingam… - Journal of Intelligent & … - content.iospress.com
Traditional testimony and electronic endorsements are extremely challenging to uphold and
defend, and there is a problem with challenging authentication. The identity of the student is …