Zobrazeno 1 - 10
of 1 386
pro vyhledávání: '"Merkle tree"'
Publikováno v:
Software, Vol 3, Iss 3, Pp 328-344 (2024)
The automotive industry is experiencing a significant shift, transitioning from traditional hardware-centric systems to more advanced software-defined architectures. This change is enabling enhanced autonomy, connectivity, safety, and improved in-veh
Externí odkaz:
https://doaj.org/article/308e6ad2f4a344468809cbbbe6ebd0f5
Autor:
Iram Abrar, Javaid A. Sheikh
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-17 (2024)
Abstract Blockchain technology has gained attention in recent times owing to its ability to revolutionize traditional trade through its distributed ledger attribute. The prompt advancement of blockchain demands new systematic studies to investigate a
Externí odkaz:
https://doaj.org/article/10c3b23a68b34036936ccd04571ca564
Publikováno v:
IEEE Access, Vol 12, Pp 79530-79548 (2024)
The automotive industry is experiencing a significant evolution from traditional hardware-defined to software-defined architecture, enabling higher levels of autonomy, connectivity, safety, and richer in-vehicle experiences. A service oriented archit
Externí odkaz:
https://doaj.org/article/d53bd8f0ecf24f34b4196ea927e7781e
Autor:
Yu Wang
Publikováno v:
International Journal of Intelligent Networks, Vol 5, Iss , Pp 120-132 (2024)
In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge the difficulties related to dispersed and decentral
Externí odkaz:
https://doaj.org/article/74fbdff777434c47b9b5c50b7efc8404
Publikováno v:
Applied Sciences, Vol 14, Iss 21, p 9725 (2024)
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principl
Externí odkaz:
https://doaj.org/article/b608bde61ce44c0bb741aebb76b11f3c
Autor:
Abraham Romero, Roberto Hernandez
Publikováno v:
Future Internet, Vol 16, Iss 10, p 356 (2024)
This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures u
Externí odkaz:
https://doaj.org/article/a6494f00f7a44a3eb4363b69ac0da170
Autor:
Hasan Volkan Oral, Bassant Sayed
Publikováno v:
Journal of Sustainable Construction Materials and Technologies, Vol 8, Iss 2, Pp 146-152 (2023)
This study investigates the important role that the blockchain plays to manage the information about who did what and when and hence provides a strong base for any legal potential conflicts. Blockchain technology permits you to distribute, encrypt, a
Externí odkaz:
https://doaj.org/article/73d3a9dfa1ff4cc5ab17b81d0a2cb22e
Publikováno v:
IEEE Access, Vol 11, Pp 59263-59273 (2023)
Cloud storage is an essential method for data storage. Verifying the integrity of data in the cloud is critical for the client. Traditional cloud storage approaches rely on third-party auditors (TPAs) to accomplish auditing tasks. However, third-part
Externí odkaz:
https://doaj.org/article/69e9916dfd6c4d9cabf3087ecdfbb630
Autor:
Wenbing Zhao, Izdehar M. Aldyaflah, Pranav Gangwani, Santosh Joshi, Himanshu Upadhyay, Leonel Lagos
Publikováno v:
IEEE Access, Vol 11, Pp 21712-21728 (2023)
In this paper, we present the design, implementation, and evaluation of a secure sensing data processing and logging system. The system is inspired and enabled by the blockchain technology. In this system, a public blockchain is used as immutable dat
Externí odkaz:
https://doaj.org/article/fcc4e4a04a92462d939aa6be93d93ac8
Publikováno v:
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol 16, Pp 1378-1389 (2023)
Secure retrieval of remote sensing images in an outsourced cloud environment garners considerable attention. Since the cloud service provider (CSP) is considered as a semitrusted third party that may return incorrect retrieval results to save computa
Externí odkaz:
https://doaj.org/article/965a96ab44a9473db640507f22f7936d