Filters








37 Hits in 7.1 sec

Blockchain-Based Multimedia Content Protection: Review and Open Challenges

Amna Qureshi, David Megías Jiménez
2020 Applied Sciences  
A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital  ...  To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection  ...  Researchers must consider all these aspects while designing and implementing a new blockchain-based content protection scheme.  ... 
doi:10.3390/app11010001 fatcat:fmtgrkgphfejfdxwpuatw4vkvu

Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture

Nikolaos Kapsoulis, Alexandros Psychas, Georgios Palaiokrassas, Achilleas Marinakis, Antonios Litke, Theodora Varvarigou
2020 Future Internet  
In the context of Know Your Customer (KYC) standardization, a decentralized schema that enables user privacy protection on enterprise blockchains is proposed with two types of developed smart contracts  ...  Through the public KYC smart contract, a user registers and uploads their KYC information to the exploited IPFS storage, actions interpreted in blockchain transactions on the permissioned blockchain of  ...  User privacy protection is implemented in a permissioned blockchain method through two types of smart contracts.  ... 
doi:10.3390/fi12020041 fatcat:5fn7h5qvzbctlmn32x2qcck6qm

Monitoring File Integrity Using Blockchain and Smart Contracts

Alexandre Pinheiro, Edna Dias Canedo, Rafael Timoteo De Sousa, Robson De Oliveira Albuquerque
2020 IEEE Access  
The authors would like to thank the Science and Technology Department of the Brazilian Army for providing all the laboratory infrastructure employed in this study.  ...  [18] propose a Blockchain-based integrity protection framework to monitor files stored in distributed storage servers.  ...  The transactions completed by these participants are recorded in small blocks forming a chain of sequential blocks (Blockchain) that is replicated to all participants in the respective network.  ... 
doi:10.1109/access.2020.3035271 fatcat:skmysylbtze3rainixgf6i6v3a

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
2019 Big Data Security  
MySQL Cluster N/A RAMP Parallel recording in files Extended Hadoop Backward provenance tracing N/A HadoopProv Parallel recording in files Modified Hadoop Parallel query through index  ...  Blockverify has its own private blockchain, but it also uses Bitcoin's blockchain to record important changes in its chain.  ...  The future research plan is to extend the other solutions possible as a new problem arises every corner of the world connected or to be connected. Nomenclature IoT Internet  ... 
doi:10.1515/9783110606058-202 fatcat:3jtqdtgsavas7n3vxrtbrkdbdy

Survey of Blockchain from the Perspectives of Applications, Challenges and Opportunities

Ahmed Afif Monrat, Olov Schelen, Karl Andersson
2019 IEEE Access  
like to operate and maintain such a large blockchain.  ...  Therefore, it has become a great challenge to deal with the tradeoff between blockchain size and trust.  ...  By comprising identity verification with that decentralized blockchain principle, a digital ID can be generated. This ID can be assigned to every online transaction similar to a watermark.  ... 
doi:10.1109/access.2019.2936094 fatcat:dqw5rmlt65ekhosqrfhpwdq6aa

MyHealthMyData (MHMD): Deliverable 2.6 - Privacy-by-design and compliance assessment

Lorenzo Cristofaro, Rocco Panetta
2019 Zenodo  
This deliverable represents the data protection impact assessment (DPIA) of the MHMD project.  ...  , scope, context and purposes, is likely to result in a «high risk» to the rights and freedoms of natural persons (Art. 35.1).  ...  are unevenly distributed or belong to a small range of values or semantic meanings.  ... 
doi:10.5281/zenodo.3541593 fatcat:e4d4ophzavchxddosamaw3xkre

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
This paper forms the basis of understanding the difficulty of the domain and the amount of efficiency achieved by the various methods recently.  ...  Precise diagnosis of these diseases on time is very significant for maintaining a healthy life.  ...  Lastly, the Stirling engine has a potential to be competitive enough with the other renewable technologies with some necessary technical modifications to make this heat engine a feasible and effective  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

SEDIBLOFRA: A Blockchain-Based, Secure Framework for Remote Data Transfer in Unmanned Aerial Vehicles

Jesus Rodriguez-Molina, Beatriz Corpas, Christian Hirsch, Pedro Castillejo
2021 IEEE Access  
Publish/Subscribe communications offer a way to enhance data delivery. Finally, blockchain provides a way to keep all the transferred data in a redundant and immutable manner.  ...  This manuscript puts forward a SEDIBLOFRA (Secure, Distributed, Blockchain-based Framework) for remote maneuvering of UAVs, based on several distributed systems technologies that pile up to provide complementary  ...  Fotohi et al. propose their agent-based self-protective method for UAV networks (ASP-UAVN) in [18] .  ... 
doi:10.1109/access.2021.3106379 fatcat:s3nwanja2naivpbogtoz7uj2wu

Cyberphysical Security of Grid Battery Energy Storage Systems

Rodrigo D. Trevizan, James Obert, Valerio De Angelis, Tu A. Nguyen, Vittal S. Rao, Babu R. Chalamala
2022 IEEE Access  
They would also like to thank Dr. David Rosewater, Victoria O'Brien, and Dr. Reed Wittman for their valuable input. VOLUME 10, 2022  ...  ACKNOWLEDGMENT The authors would like to thank Dr. Imre Gyuk, Director of Energy Storage Research, Office of Electricity Delivery and Energy Reliability for his funding and guidance on this research.  ...  , networked protection relays and fault recorders, video monitoring systems, power quality devices, to name a few [18] .  ... 
doi:10.1109/access.2022.3178987 fatcat:z3erpvu6pbh65hk6w25bqb3x7m

Dictionary of Cash Management [article]

J. Darío Negueruela Martínez
2021 Zenodo  
The most complete dictionary of terms related to Cash Management, Design, Production, Security and Logistical issues of Banknotes. A very useful tool for beginners and professionals.  ...  Written in a comprehensive language include more than 550 terms and it is an ideal complement for cash lectures  ...  file entry and output devices such as graphics tablets and scanners.  ... 
doi:10.5281/zenodo.5501809 fatcat:zm3m5k46gbcaxo7lgovmpfyehm

A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions [article]

Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage
2022 arXiv   pre-print
To make these expectations a reality, research is progressing on new technologies, architectures, and intelligence-based decision-making processes related to B5G/6G.  ...  Next, this work provides a set of solutions applicable to the proposed architecture of B5G/6G networks to mitigate the challenges.  ...  There are existing methods for AI models to add unique watermarks in a model's decision interface.  ... 
arXiv:2203.04264v1 fatcat:blbzfjy73fhlvammlwsgfmso5y

MyHealthMyData (MHMD): Deliverable 1.1 - Initial List of Main Requirements

Douglas Teodoro
2017 Zenodo  
Thus, this report is supposed to be a living document that will change through the whole project.  ...  ., and comprise the main user and technical requirements.  ...  Finally, the data is transferred to the clinical researcher and a transaction record is stored in the blockchain.  ... 
doi:10.5281/zenodo.1042565 fatcat:n7rl2l27ojby5jnicjcjkmmfoy

National Conference on Recent Advances in Communication Engineering and Information Technology

2020 International journal for innovative engineering and management research  
We provide a broad-based engineering curriculum, with opportunities for specialization and self-directed learning and development.  ...  Our philosophy is not only to educate engineers, but also to prepare them for future leadership roles in industry– indeed, many of our alumni are now Directors of Industry, leading their organizations  ...  This paper introduces a new Hybrid MPPT algorithm by combining new Ant Colony Optimization (ACO) and Perturb & Observe (P&O) method.  ... 
doi:10.48047/ijiemr/v08/spe/02 fatcat:woay334irjgebf5bixuc4ng6em

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Periodic polling from UE to core network to cross check received charging records from edge. A new or similar mechanism like that of 3GPP.  ...  Stop new unknown access through access control when network is exhausted or check the novelty and standardization of signal patter and requires to find a new method to overcome DOS attack.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Program

2022 2022 International Conference on Decision Aid Sciences and Applications (DASA)  
The proposed method can further be used to detect other neurological disorders.  ...  A maximum of 92.90% classification accuracy is obtained using the features of IMF-4 with 10-fold cross-validation. The results conclude that the proposed method can detect AD patients efficiently.  ...  to the method of blockchain that they adopted.  ... 
doi:10.1109/dasa54658.2022.9765271 fatcat:ttqppf4j3navnaxe653mrzmezi
« Previous Showing results 1 — 15 out of 37 results