A systematic literature review on sensitive data protection in blockchain applications
Since inception, blockchain has earned significant attention due to its exclusive
characteristics and advantages. It has changed the way the transactions are conducted by …
characteristics and advantages. It has changed the way the transactions are conducted by …
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
Cloud-based anonymous messaging systems have been widely utilized in covert
conversations to enable people to anonymously exchange encrypted data in public using …
conversations to enable people to anonymously exchange encrypted data in public using …
A Bilateral Access Control Data Sharing Scheme for Internet of Vehicles
X Hu, L Wang, L Gu, Y Ning - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Data sharing among vehicles can effectively address the traffic congestion and accidents
caused by the increasing number of vehicles, thereby enhancing traffic efficiency and the …
caused by the increasing number of vehicles, thereby enhancing traffic efficiency and the …
XAutn: Blockchain-based cross domain authentication for digital certificates in the education sector
SB Priya, PS Rani, SP Chokkalingam… - Journal of Intelligent & … - content.iospress.com
Traditional testimony and electronic endorsements are extremely challenging to uphold and
defend, and there is a problem with challenging authentication. The identity of the student is …
defend, and there is a problem with challenging authentication. The identity of the student is …