Latest
- Cumulus: Blockchain-Enabled Privacy-Preserving Data Audit in Cloud
- Storage Proofs for Historical Ethereum Data
- Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility
- Security Considerations for Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
- Real-Time and Trustworthy Classification of IoT Traffic Using Lightweight Deep Learning
- SoK: Trusting Self-Sovereign Identity
- Bitcoin Blockchain System: An Overview of Security and Privacy Aspects
- Electric Vehicle Next Charge Location Prediction
- Layer 2 Scaling Solutions for Blockchains
- Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures
- One-Phase Batch Update on Sparse Merkle Trees for Rollups
- Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain
- Accelerated Verifiable Fair Digital Exchange
- ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness
- Strategic Analysis of Griefing Attack in Lightning Network
- CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
- FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT
- Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques
- Blockchain-Enabled Secure and Smart Healthcare System
- DIMY: Enabling privacy-preserving contact tracing
- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
- On the Vulnerability of Community Structure in Complex Networks
- SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT
- Strategic Analysis to defend against Griefing Attack in Lightning Network
- Design of Anonymous Endorsement System in Hyperledger Fabric
- A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0
- Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie
- Preface
- Smart HealthCare System
- Towards Privacy-preserving Digital Contact Tracing
- A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
- A parallelized disjunctive query based searchable encryption scheme for big data
- A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0
- A Survey of COVID-19 Contact Tracing Apps
- A Technical Look At The Indian Personal Data Protection Bill
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
- Efficient Decentralized Attribute Based Access Control for Mobile Clouds
- Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage
- Griefing-penalty: Countermeasure for griefing attack in lightning network
- HushRelay: A privacy-preserving, efficient, and scalable routing algorithm for off-chain payments
- Reliable, fair and decentralized marketplace for content sharing using blockchain
- Verifiable and auditable digital interchange framework#
- A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
- Blockchain enabled privacy preserving data audit
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme
- Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
- LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie
- Maximal contrast color visual secret sharing schemes
- The secure link prediction problem
- A survey on security and privacy issues of bitcoin
- An Efficient Secure Distributed Cloud Storage for Append-Only Data
- Applying transmission-coverage algorithms for secure geocasting in VANETs
- Blockchain Enabled Data Marketplace - Design and Challenges
- BlockStore: A secure decentralized storage framework on blockchain
- Data forwarding and update propagation in grid network for NDN: A low-overhead approach
- Key predistribution using transversal design on a grid of wireless sensor network
- Keyword-based delegable proofs of storage
- On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
- Secure computation of inner product of vectors with distributed entries and its applications to SVM
- Security issues in named data networks
- A graph analytics framework for ranking authors, papers and venues
- Bitcoin Block Withholding Attack: Analysis and Mitigation
- Certificate Transparency with Enhancements and Short Proofs
- Cloud Data Auditing Using Proofs of Retrievability
- Expressive rating scheme by signatures with predications on ratees
- Failure tolerant rational secret sharing
- On the application of clique problem for proof-of-work in cryptocurrencies
- Preferential attachment model with degree bound and its application to key predistribution in WSN
- Achieving data survivability and confidentiality in unattended wireless sensor networks
- CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications
- A social network approach to trust management in VANETs
- Analyzing cascading failures in smart grids under random and targeted attacks
- Decentralized access control with anonymous authentication of data stored in clouds
- Security services using crowdsourcing
- Should silence be heard? Fair rational secret sharing with silent and non-silent players
- A decentralized security framework for data aggregation and access control in smart grids
- Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary
- Enhanced privacy and reliability for secure geocasting in VANET
- Jamming resistant schemes for wireless communication: A combinatorial approach
- Pairwise and triple key distribution in wireless sensor networks with applications
- Combinatorial batch codes: A lower bound and optimal constructions
- Improved distinguishers for HC-128
- Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
- Improved access control mechanism in vehicular ad hoc networks
- Key pre-distribution using partially balanced designs in wireless sensor networks
- On data-centric misbehavior detection in VANETs
- Key predistribution schemes using codes in wireless sensor networks
- Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks
- Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme