Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Peter Foytik"'
Autor:
Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
Publikováno v:
IEEE Access, Vol 8, Pp 178372-178390 (2020)
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift
Externí odkaz:
https://doaj.org/article/0641fbfb24bf41a092c8c4a4433218b7
Autor:
Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa
Publikováno v:
International Journal of Information Security. 22:591-609
Autor:
Peter Foytik, Ravi Mukkamala, Nalin Ranasinghe, Sachin Shetty, Eranga Bandara, Kasun De Zoysa, Xueping Liang
Publikováno v:
Journal of Banking and Financial Technology. 6:43-62
Autor:
Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Ng Wee Keong
Publikováno v:
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM).
Autor:
Peter Foytik, Eranga Bandara, Nalin Ranasinghe, Sachin Shetty, Kasun De Zoysa, Deepak K. Tosh
Publikováno v:
Future Generation Computer Systems. 119:154-165
Internet of Things (IoT) platforms have been deployed in several domains to enhance efficiency of business process and improve productivity. Most IoT platforms comprise of heterogeneous software and hardware components which can potentially introduce
Autor:
Peter Foytik, Georges A. Kamhoua, Laurent Njilla, Sachin Shetty, Ravi Mukkamala, Sarada Prasad Gochhayat
Publikováno v:
IEEE Access, Vol 8, Pp 178372-178390 (2020)
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift
Publikováno v:
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC).
Publikováno v:
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
Publikováno v:
SMARTCOMP
Cyber threat information (CTI) sharing involves processes of the collection, analysis and sharing of cyber threat information among multiple organizations. CTI is highly sensitive and inadvertent access can harm an organisation’s reputation. Moreov
Publikováno v:
ICCCN
Most of the existing identity systems are built on top of centralized storage systems. Storing identity data on these types of centralized storage platforms(e.g cloud storage, central servers) becomes a major privacy concern since various types of at