A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Blockchain-Based Multimedia Content Protection: Review and Open Challenges
2020
Applied Sciences
A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital ...
To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection ...
Researchers must consider all these aspects while designing and implementing a new blockchain-based content protection scheme. ...
doi:10.3390/app11010001
fatcat:fmtgrkgphfejfdxwpuatw4vkvu
Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture
2020
Future Internet
In the context of Know Your Customer (KYC) standardization, a decentralized schema that enables user privacy protection on enterprise blockchains is proposed with two types of developed smart contracts ...
Through the public KYC smart contract, a user registers and uploads their KYC information to the exploited IPFS storage, actions interpreted in blockchain transactions on the permissioned blockchain of ...
User privacy protection is implemented in a permissioned blockchain method through two types of smart contracts. ...
doi:10.3390/fi12020041
fatcat:5fn7h5qvzbctlmn32x2qcck6qm
Monitoring File Integrity Using Blockchain and Smart Contracts
2020
IEEE Access
The authors would like to thank the Science and Technology Department of the Brazilian Army for providing all the laboratory infrastructure employed in this study. ...
[18] propose a Blockchain-based integrity protection framework to monitor files stored in distributed storage servers. ...
The transactions completed by these participants are recorded in small blocks forming a chain of sequential blocks (Blockchain) that is replicated to all participants in the respective network. ...
doi:10.1109/access.2020.3035271
fatcat:skmysylbtze3rainixgf6i6v3a
List of Contributors
[chapter]
2019
Big Data Security
MySQL Cluster
N/A
RAMP
Parallel recording in
files
Extended Hadoop Backward provenance
tracing
N/A
HadoopProv Parallel recording in
files
Modified Hadoop
Parallel query through
index ...
Blockverify has its own private blockchain, but it also uses Bitcoin's blockchain to record important changes in its chain. ...
The future research plan is to extend the other solutions possible as a new problem arises every corner of the world connected or to be connected.
Nomenclature
IoT Internet ...
doi:10.1515/9783110606058-202
fatcat:3jtqdtgsavas7n3vxrtbrkdbdy
Survey of Blockchain from the Perspectives of Applications, Challenges and Opportunities
2019
IEEE Access
like to operate and maintain such a large blockchain. ...
Therefore, it has become a great challenge to deal with the tradeoff between blockchain size and trust. ...
By comprising identity verification with that decentralized blockchain principle, a digital ID can be generated. This ID can be assigned to every online transaction similar to a watermark. ...
doi:10.1109/access.2019.2936094
fatcat:dqw5rmlt65ekhosqrfhpwdq6aa
MyHealthMyData (MHMD): Deliverable 2.6 - Privacy-by-design and compliance assessment
2019
Zenodo
This deliverable represents the data protection impact assessment (DPIA) of the MHMD project. ...
, scope, context and purposes, is likely to result in a «high risk» to the rights and freedoms of natural persons (Art. 35.1). ...
are unevenly distributed or belong to a small range of values or semantic meanings. ...
doi:10.5281/zenodo.3541593
fatcat:e4d4ophzavchxddosamaw3xkre
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
This paper forms the basis of understanding the difficulty of the domain and the amount of efficiency achieved by the various methods recently. ...
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life. ...
Lastly, the Stirling engine has a potential to be competitive enough with the other renewable technologies with some necessary technical modifications to make this heat engine a feasible and effective ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
SEDIBLOFRA: A Blockchain-Based, Secure Framework for Remote Data Transfer in Unmanned Aerial Vehicles
2021
IEEE Access
Publish/Subscribe communications offer a way to enhance data delivery. Finally, blockchain provides a way to keep all the transferred data in a redundant and immutable manner. ...
This manuscript puts forward a SEDIBLOFRA (Secure, Distributed, Blockchain-based Framework) for remote maneuvering of UAVs, based on several distributed systems technologies that pile up to provide complementary ...
Fotohi et al. propose their agent-based self-protective method for UAV networks (ASP-UAVN) in [18] . ...
doi:10.1109/access.2021.3106379
fatcat:s3nwanja2naivpbogtoz7uj2wu
Cyberphysical Security of Grid Battery Energy Storage Systems
2022
IEEE Access
They would also like to thank Dr. David Rosewater, Victoria O'Brien, and Dr. Reed Wittman for their valuable input. VOLUME 10, 2022 ...
ACKNOWLEDGMENT The authors would like to thank Dr. Imre Gyuk, Director of Energy Storage Research, Office of Electricity Delivery and Energy Reliability for his funding and guidance on this research. ...
, networked protection relays and fault recorders, video monitoring systems, power quality devices, to name a few [18] . ...
doi:10.1109/access.2022.3178987
fatcat:z3erpvu6pbh65hk6w25bqb3x7m
Dictionary of Cash Management
[article]
2021
Zenodo
The most complete dictionary of terms related to Cash Management, Design, Production, Security and Logistical issues of Banknotes. A very useful tool for beginners and professionals. ...
Written in a comprehensive language include more than 550 terms and it is an ideal complement for cash lectures ...
file entry and output devices such as graphics tablets and scanners. ...
doi:10.5281/zenodo.5501809
fatcat:zm3m5k46gbcaxo7lgovmpfyehm
A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions
[article]
2022
arXiv
pre-print
To make these expectations a reality, research is progressing on new technologies, architectures, and intelligence-based decision-making processes related to B5G/6G. ...
Next, this work provides a set of solutions applicable to the proposed architecture of B5G/6G networks to mitigate the challenges. ...
There are existing methods for AI models to add unique watermarks in a model's decision interface. ...
arXiv:2203.04264v1
fatcat:blbzfjy73fhlvammlwsgfmso5y
MyHealthMyData (MHMD): Deliverable 1.1 - Initial List of Main Requirements
2017
Zenodo
Thus, this report is supposed to be a living document that will change through the whole project. ...
., and comprise the main user and technical requirements. ...
Finally, the data is transferred to the clinical researcher and a transaction record is stored in the blockchain. ...
doi:10.5281/zenodo.1042565
fatcat:n7rl2l27ojby5jnicjcjkmmfoy
National Conference on Recent Advances in Communication Engineering and Information Technology
2020
International journal for innovative engineering and management research
We provide a broad-based engineering curriculum, with opportunities for specialization and self-directed learning and development. ...
Our philosophy is not only to educate engineers, but also to prepare them for future leadership roles in industry– indeed, many of our alumni are now Directors of Industry, leading their organizations ...
This paper introduces a new Hybrid MPPT algorithm by combining new Ant Colony Optimization (ACO) and Perturb & Observe (P&O) method. ...
doi:10.48047/ijiemr/v08/spe/02
fatcat:woay334irjgebf5bixuc4ng6em
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
Periodic polling from UE to core network to cross check received charging records from edge. A new or similar mechanism like that of 3GPP. ...
Stop new unknown access through access control when network is exhausted or check the novelty and standardization of signal patter and requires to find a new method to overcome DOS attack. ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Program
2022
2022 International Conference on Decision Aid Sciences and Applications (DASA)
The proposed method can further be used to detect other neurological disorders. ...
A maximum of 92.90% classification accuracy is obtained using the features of IMF-4 with 10-fold cross-validation. The results conclude that the proposed method can detect AD patients efficiently. ...
to the method of blockchain that they adopted. ...
doi:10.1109/dasa54658.2022.9765271
fatcat:ttqppf4j3navnaxe653mrzmezi
« Previous
Showing results 1 — 15 out of 37 results