Your selections:
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Wang, Qubeijian, Dai, Hong-Ning, Li, Xuran, Shukla, Mahendra, Imran, Muhammad
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Yahaya, Adamu, Javaid, Nadeem, Khalid, Rabiya, Imran, Muhammad, Guizani, Mohsen
Is blockchain for internet of medical things a panacea for COVID-19 pandemic?
- Li, Xuran, Tao, Bishenghui, Dai, Hong-Ning, Imran, Muhammad, Wan, Dehuan, Li, Dengwang
Security in software-defined networking : threats and countermeasures
- Shu, Zhaogang, Wan, Jiafu, Li, Di, Lin, Jiaxiang, Vasilakos, Athanasios, Imran, Muhammad
An IIoT-Based Networked Industrial Control System Architecture to Secure Industrial Applications
Coding observer nodes for sybil attacks detection in mobile wireless sensor networks
- Sassani Sarrafpour, Bahman, Alomirah, Alomirah, Pang, Shaning, Sarrafpour, Soshian
Ear in the sky : terrestrial mobile jamming to prevent aerial eavesdropping
- Wang, Qubeijian, Liu, Yalin, Dai, Hong-Ning, Imran, Muhammad, Nasser, Nidal
Determinants of the intention to adopt digital-only banks in Malaysia: The extension of environmental concern
- Saif, Mashaal A. M., Hussin, Nazimah, Husin, Maizaitulaidawati Md, Alwadain, Ayed, Chakraborty, Ayon
- Ghamsari-Yazdel, Mohammad, Najafi, Hamid reza, Amjady, Nima
Formal modeling and verification of a blockchain-based crowdsourcing consensus protocol
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad, Gochhayat, Sarada
- Patwary, Abdullah Al-Noman, Naha, Ranesh Kumar, Garg, Saurabh, Battula, Sudheer Kumar, Patwary, Md Anwarul Kaium, Aghasian, Erfan, Amin, Muhammad Bilal, Mahanti, Aniket, Gong, Mingwei
Cybersecurity challenges in blockchain technology : a scoping review
- Mahmood, Samreen, Chadhar, Mehmood, Firmin, Sally
A framework for data privacy and security accountability in data breach communications
- Thomas, Louise, Gondal, Iqbal, Oseni, Taiwo, Firmin, Sally
User authentication and access control to blockchain-based forensic log data
- Islam, Md Ezazul, Islam, Md Rafiqul, Chetty, Madhu, Lim, Suryani, Chadhar, Mehmood
New subjectivities of work? : technologies and capitalism into the future
Are you sure you would like to clear your session, including search history and login status?