Blockchain-based multi-factor authentication: A systematic literature review

MS Almadani, S Alotaibi, H Alsobhi, OK Hussain… - Internet of Things, 2023 - Elsevier
Blockchain-based multi-factor authentication (BMFA) combines multi-factor authentication
with blockchain technology to provide a reliable and secure authentication mechanism. In …

Survey on iot multi-factor authentication protocols: A systematic literature review

ZAAM Fneish, M El-Hajj… - 2023 11th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects that is equipped with computers,
electronics, applications, sensors, and other devices. As the number of IoT devices and apps …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …

[PDF][PDF] Aplikasi berbasis blockchain dalam dunia pendidikan dengan metode systematics review

Q Aini, U Rahardja, NPL Santoso… - CESS (Journal of …, 2021 - academia.edu
Penemuan teknologi baru serta koneksi yang meluas berperan penting pada aspek
kehidupan sehari-hari. Dengan perkembangan teknologi saat ini sistem pendidikan yang …

[PDF][PDF] Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain

N Chaniago, P Sukarno, AA Wardana - Register, 2021 - journal.unipdu.ac.id
Ethereum is one of the oldest examples of blockchain technology provides a system that
converts centralized storage to distributed and records transactions by way of decentralized …

Exploring Blockchain and Supply Chain Integration: State-of-the-Art, Security Issues and Emerging Directions

U Agarwal, V Rishiwal, M Yadav, M Aslhammari… - IEEE …, 2024 - ieeexplore.ieee.org
The growing complexities in supply chain management, driven by internationalization,
decentralization, and modernization, are increasingly threatened by data breaches, network …

ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security

F Alsulami, AR Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the
integration of communication and internet in its network. It facilitates the bidirectional flow of …

Blacklisted IP distribution system to handle DDoS attacks on IPS Snort based on Blockchain

BAA Al'aziz, P Sukarno… - 2020 6th Information …, 2020 - ieeexplore.ieee.org
The mechanism for distributing information on the source of the attack by combining
blockchain technology with the Intrusion Prevention System (IPS) can be done so that DDoS …

Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication

JJD Rivera, A Muhammad… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As network systems advance and become more sophisticated, the associated security
challenges grow more complex. The zero trust model emerges as a new paradigm to …

Ensuring security of encrypted information by hybrid aes and rsa algorithm with third-party confirmation

S Al Mamun, MA Mahmood… - 2021 5th International …, 2021 - ieeexplore.ieee.org
Information transmission security and wellbeing is an intriguing issue right now. secure
information transmission alludes to the exchange of information, for example, private or …