|
|
|
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta...
ver más
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Gabriel Nyame, Zhiguang Qin, Kwame Opuni-Boachie Obour Agyekum and Emmanuel Boateng Sifah
Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and ...
ver más
|
|
|
|
|
|
|
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono
Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w...
ver más
|
|
|
|
|
|
|
Javier Omar Contreras Rodriguez, Reinaldo Nicolás Mayol Arnao
Pág. 41 - 53
En la actualidad, el auge de las aplicaciones de las redes de sensores inalámbricos (WSN = Wireless Sensors Networks) está generando una gran cantidad de información de carácter sensible que requiere un manejo confiable mediante la implementación de sist...
ver más
|
|
|
|