This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Akhbarifar, S., Javadi, H.H.S., Rahmani, A.M., Hosseinzadeh, M. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput. 2023, 27, 697–713.AkhbarifarS.JavadiH.H.S.RahmaniA.M.HosseinzadehM.A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environmentPers. Ubiquitous Comput.202327697713Search in Google Scholar
Medileh, S., Laouid, A., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., Khashan, O.A. A flexible encryption technique for the internet of things environment. Ad. Hoc. Netw. 2020, 106, 102240.MedilehS.LaouidA.EulerR.BounceurA.HammoudehM.AlShaikhM.EleyanA.KhashanO.A.A flexible encryption technique for the internet of things environmentAd. Hoc. Netw.2020106102240Search in Google Scholar
Fuchsbauer, G., Plouviez, A., Seurin, Y. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Cham, Switzerland, 2020; pp. 63–95.FuchsbauerG.PlouviezA.SeurinY.Blind Schnorr signatures and signed ElGamal encryption in the algebraic group modelIn Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic TechniquesZagreb, Croatia10–14 May 2020SpringerCham, Switzerland20206395Search in Google Scholar
Zheng, R., Jia, H., Abualigah, L., Liu, Q., Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2020.ZhengR.JiaH.AbualigahL.LiuQ.WangS.Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimizationProcesses2020Search in Google Scholar
Krichen, M., Mihoub, A., Alzahrani, M.Y., Adoni, W.Y.H., Nahhal, T. Are Formal Methods Applicable to Machine Learning And Artificial Intelligence? In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 9–11 May 2022; pp. 48–53.KrichenM.MihoubA.AlzahraniM.Y.AdoniW.Y.H.NahhalT.Are Formal Methods Applicable to Machine Learning And Artificial Intelligence?In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH)Riyadh, Saudi Arabia9–11 May 20224853Search in Google Scholar
Raman, R., Gupta, N., Jeppu, Y. Framework for Formal Verification of Machine Learning Based Complex System-of-Systems. Insight 2023, 26, 91–102.RamanR.GuptaN.JeppuY.Framework for Formal Verification of Machine Learning Based Complex System-of-SystemsInsight20232691102Search in Google Scholar
G.S. Reddy, S. Radha, K.T. Taufiq, K.D.S. Reddy, K.P.K. Reddy, P. Nagabushanam. Security based Electronic Voting Machine using Xilinx tool. 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (2022), pp. 1–4, 10.1109/PARC52418.2022.9726556ReddyG.S.RadhaS.TaufiqK.T.ReddyK.D.S.ReddyK.P.K.NagabushanamP.Security based Electronic Voting Machine using Xilinx tool2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)20221410.1109/PARC52418.2022.9726556Open DOISearch in Google Scholar
V. Bhatt, A.K. Bindal. Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) (2021), pp. 262–265, 10.1109/ISPCC53510.2021.9609399BhattV.BindalA.K.Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)202126226510.1109/ISPCC53510.2021.9609399Open DOISearch in Google Scholar
X. Xu, H. Zhao, H. Yao, S. Wang. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet of Things Journal, 8 (4) (2021), pp. 2431–2443, 10.1109/JIOT.2020.3030080XuX.ZhaoH.YaoH.WangS.A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoTIEEE Internet of Things Journal8420212431244310.1109/JIOT.2020.3030080Open DOISearch in Google Scholar
S. Pothumani, A. Arunachalam. Effective Security Mechanisms for Big Data Using Block Chain Technology 2021 International Conference on Computer Communication and Informatics (ICCCI) (2021), pp. 1–6, 10.1109/ICCCI50826.2021.9402458PothumaniS.ArunachalamA.Effective Security Mechanisms for Big Data Using Block Chain Technology2021 International Conference on Computer Communication and Informatics (ICCCI)20211610.1109/ICCCI50826.2021.9402458Open DOISearch in Google Scholar
R. Shrivastava, A. Tiwary, P. Yadav. Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review 2021 International Conference on Advances in Technology, Management & Education (ICATME) (2021), pp. 238–243, 10.1109/ICATME50232.2021.9732730ShrivastavaR.TiwaryA.YadavP.Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review2021 International Conference on Advances in Technology, Management & Education (ICATME)202123824310.1109/ICATME50232.2021.9732730Open DOISearch in Google Scholar
Reddy, G. S., Radha, S., Taufiq, K. T., Reddy, K. D. S., Reddy, K. P. K., & Nagabushanam, P. (2022). Security based electronic voting machine using Xilinx tool. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (pp. 1–4). IEEE. https://doi.org/10.1109/PARC52418.2022.9726556ReddyG. S.RadhaS.TaufiqK. T.ReddyK. D. S.ReddyK. P. K.NagabushanamP.2022Security based electronic voting machine using Xilinx toolIn 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)14IEEEhttps://doi.org/10.1109/PARC52418.2022.9726556Search in Google Scholar
Devibala, A. (2019). A survey on security issues in IoT for blockchain healthcare. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (pp. 1–7). IEEE. https://doi.org/10.1109/ICECCT.2019.8869253DevibalaA.2019A survey on security issues in IoT for blockchain healthcareIn 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)17IEEEhttps://doi.org/10.1109/ICECCT.2019.8869253Search in Google Scholar
Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N., & Ghosh, A. (2021). Blockchain-based model for expanding IoT device data security. In J. C. Bansal, L. C. C. Fung, M. Simic, & A. Ghosh (Eds.), Advances in Applications of Data-Driven Computing (Vol. 1319). Springer, Singapore. https://doi.org/10.1007/978-981-33-6919-1_5RajawatA. S.RawatR.BarhanpurkarK.ShawR. N.GhoshA.2021Blockchain-based model for expanding IoT device data securityInBansalJ. C.FungL. C. C.SimicM.GhoshA.(Eds.),Advances in Applications of Data-Driven Computing1319SpringerSingaporehttps://doi.org/10.1007/978-981-33-6919-1_5Search in Google Scholar
Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. Falcon. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 31–41.SoniD.BasuK.NabeelM.AarajN.ManzanoM.KarriR.SoniD.BasuK.NabeelM.AarajN.FalconInHardware Architectures for Post-Quantum Digital Signature SchemesSpringerBerlin/Heidelberg, Germany20213141Search in Google Scholar
Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. SPHINCS + . In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 141–162.SoniD.BasuK.NabeelM.AarajN.ManzanoM.KarriR.SoniD.BasuK.NabeelM.AarajN.SPHINCS +InHardware Architectures for Post-Quantum Digital Signature SchemesSpringerBerlin/Heidelberg, Germany2021141162Search in Google Scholar
Zhang, J., Chen, Y., Zhang, Z. Lattice-Based Programmable Hash Functions and Applications. J. Cryptol. 2024, 37, 4.ZhangJ.ChenY.ZhangZ.Lattice-Based Programmable Hash Functions and ApplicationsJ. Cryptol.2024374Search in Google Scholar
Mehrabi M.A. and Doche C., “Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,” 2019. https://doi.org/10.3390/info10090285MehrabiM.A.DocheC.“Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,”2019https://doi.org/10.3390/info10090285Search in Google Scholar
Faz-Hernandez A., Lopez J., and Dahab R., “High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,” ACM Transactions on Mathematical Software, vol. 45, no. 3, pp. 1–35, 2019. https://doi.org/10.1145/3309759Faz-HernandezA.LopezJ.DahabR.“High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,”ACM Transactions on Mathematical Software4531352019https://doi.org/10.1145/3309759Search in Google Scholar
Hu Z., Gnatyuk S., Kovtun M., and Seilova N., “Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,” Advances in Intelligent Systems and Computing, pp. 309–319, 2018. https://doi.org/10.1007/978-3-319-91008-6_31HuZ.GnatyukS.KovtunM.SeilovaN.“Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,”Advances in Intelligent Systems and Computing3093192018https://doi.org/10.1007/978-3-319-91008-6_31Search in Google Scholar
Islam M.M., Hossain M.S., Hasan M.K., Shahjalal M., and Jang Y.M., “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019. https://doi.org/10.1109/access.2019.2958491IslamM.M.HossainM.S.HasanM.K.ShahjalalM.JangY.M.“FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,”IEEE Access71788111788262019https://doi.org/10.1109/access.2019.2958491Search in Google Scholar
Franck C. and Grosschadl J., “Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,” Mobile, Secure, and Programmable Networking, pp. 1–17, 2017. https://doi.org/10.1007/978-3-319-67807-8_1FranckC.GrosschadlJ.“Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,”Mobile, Secure, and Programmable Networking1172017https://doi.org/10.1007/978-3-319-67807-8_1Search in Google Scholar
Liu Z., Grosschadl J., Hu Z., Jarvinen K., Wang H., and Verbauwhede I., “Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 773–785, 2017. https://doi.org/10.1109/tc.2016.2623609LiuZ.GrosschadlJ.HuZ.JarvinenK.WangH.VerbauwhedeI.“Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,”IEEE Transactions on Computers6657737852017https://doi.org/10.1109/tc.2016.2623609Search in Google Scholar
Liu Z., Weng J., Hu Z., and Seo H., “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 2, pp. 1–18, 2017. https://doi.org/10.1145/2967103LiuZ.WengJ.HuZ.SeoH.“Efficient Elliptic Curve Cryptography for Embedded Devices,”ACM Transactions on Embedded Computing Systems1621182017https://doi.org/10.1145/2967103Search in Google Scholar
Naresh V.S., Reddi S., and Allavarpu V.D., “Blockchain-based patient centric health care communication system,” International Journal of Communication Systems, vol. 34, no. 7, pp. 34–34, 2021. https://doi.org/10.1002/dac.4749NareshV.S.ReddiS.AllavarpuV.D.“Blockchain-based patient centric health care communication system,”International Journal of Communication Systems34734342021https://doi.org/10.1002/dac.4749Search in Google Scholar
Saini A., Zhu Q., Singh N., Xiang Y., Gao L., and Zhang Y., “A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,” IEEE IoT Journal, vol. 8, no. 7, pp. 5914–5925, 2021. https://doi.org/10.1109/jiot.2020.3032997SainiA.ZhuQ.SinghN.XiangY.GaoL.ZhangY.“A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,”IEEE IoT Journal87591459252021https://doi.org/10.1109/jiot.2020.3032997Search in Google Scholar
Jasem F.M., Sagheer A.M., and Awad A.M., “Enhancement of digital signature algorithm in bitcoin wallet,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 1, pp. 449–457, 2021. https://doi.org/10.11591/eei.v10i1.2339JasemF.M.SagheerA.M.AwadA.M.“Enhancement of digital signature algorithm in bitcoin wallet,”Bulletin of Electrical Engineering and Informatics1014494572021https://doi.org/10.11591/eei.v10i1.2339Search in Google Scholar
Sadiq A., Javed M.U., Khalid R., Almogren A., Shafiq M., and Javaid N., “Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,” IEEE Access, vol. 9, pp. 7000–7020, 2021. https://doi.org/10.1109/access.2020.3048169SadiqA.JavedM.U.KhalidR.AlmogrenA.ShafiqM.JavaidN.“Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,”IEEE Access9700070202021https://doi.org/10.1109/access.2020.3048169Search in Google Scholar
Arulprakash M. and Jebakumar R., “Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,” The Journal of Supercomputing, 2021. https://doi.org/10.1007/s11227-021-03756-xArulprakashM.JebakumarR.“Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,”The Journal of Supercomputing2021https://doi.org/10.1007/s11227-021-03756-xSearch in Google Scholar
Kavin BP, Ganapathy S., Kanimozhi U., and Kannan A., “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” 2020. https://doi.org/10.1007/s11277-020-07613-7KavinBPGanapathyS.KanimozhiU.KannanA.An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECCAccess Control and LDSA2020https://doi.org/10.1007/s11277-020-07613-7Search in Google Scholar
Benil T. and Jasper J., “Cloud-based security on outsourcing using blockchain in E-health systems Computer Networks, vol. 178, pp. 107344–107344, 2020. https://doi.org/10.1016/j.comnet.2020.107344BenilT.JasperJ.Cloud-based security on outsourcing using blockchain in E-health systemsComputer Networks1781073441073442020https://doi.org/10.1016/j.comnet.2020.107344Search in Google Scholar
Wang H., He D., and Ji Y., “Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, “Future Generation Computer Systems, vol. 107, pp. 854–862, 2020. https://doi.org/10.1016/j.future.2017.06.028WangH.HeD.JiY.Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptographyFuture Generation Computer Systems1078548622020https://doi.org/10.1016/j.future.2017.06.028Search in Google Scholar
Kumar M., Chand S., and Katti C.P., “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal, vol. 14, no. 2, pp. 2032–2041, 2020. https://doi.org/10.1109/jsyst.2019.2940474KumarM.ChandS.KattiC.P.“A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,”IEEE Systems Journal142203220412020https://doi.org/10.1109/jsyst.2019.2940474Search in Google Scholar
Li X., Mei Y., Gong J., Xiang F., and Sun Z., “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020. https://doi.org/10.1109/access.2020.2987831LiX.MeiY.GongJ.XiangF.SunZ.“A Blockchain Privacy Protection Scheme Based on Ring Signature,”IEEE Access876765767722020https://doi.org/10.1109/access.2020.2987831Search in Google Scholar
Ernest B. and Shiguang J., “Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,” IEEE Access, vol. 8, pp. 25863–25876, 2020. https://doi.org/10.1109/access.2020.2968621ErnestB.ShiguangJ.“Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,”IEEE Access825863258762020https://doi.org/10.1109/access.2020.2968621Search in Google Scholar
Zhang X., Zhou Z., Zhang J., Xu C., and Zhang X., “Efficient lightweight private auditing scheme for cloud-based wireless body area networks,” International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 139–139, 2020. https://doi.org/10.1504/ijesdf.2020.10027592ZhangX.ZhouZ.ZhangJ.XuC.ZhangX.“Efficient lightweight private auditing scheme for cloud-based wireless body area networks,”International Journal of Electronic Security and Digital Forensics1221391392020https://doi.org/10.1504/ijesdf.2020.10027592Search in Google Scholar
Ansah AKK and Gyamfi D.A., “Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,” International Journal of Computational Science and Engineering, vol. 23, no. 4, 2020. https://doi.org/10.1504/ijcse.2020.10035561AnsahAKKGyamfiD.A.“Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,”International Journal of Computational Science and Engineering2342020https://doi.org/10.1504/ijcse.2020.10035561Search in Google Scholar
Chen C.L., Deng Y.Y., Weng W., Chen C.H., Chiu Y.J., and Wu C.M., “A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,” Electronics, vol. 9, no. 1, 2020. https://doi.org/10.3390/electronics9010062ChenC.L.DengY.Y.WengW.ChenC.H.ChiuY.J.WuC.M.“A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,”Electronics912020https://doi.org/10.3390/electronics9010062Search in Google Scholar
Ullah I., Amin N.U., Almogren A., Khan M.A., Uddin M.I., and Hua Q., “A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,” IEEE Access, vol. 8, pp. 199197–199212, 2020. https://doi.org/10.1109/access.2020.3033758UllahI.AminN.U.AlmogrenA.KhanM.A.UddinM.I.HuaQ.“A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,”IEEE Access81991971992122020https://doi.org/10.1109/access.2020.3033758Search in Google Scholar
Zhang X., Zhao J., Mu L., Tang Y., and Xu C., “Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,” Pervasive and Mobile Computing, vol. 56, pp. 18–28, 2019. https://doi.org/10.1016/j.pmcj.2019.03.004ZhangX.ZhaoJ.MuL.TangY.XuC.“Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,”Pervasive and Mobile Computing5618282019https://doi.org/10.1016/j.pmcj.2019.03.004Search in Google Scholar
Taleb N., “Prospective applications of blockchain and bitcoin cryptocurrency technology,” TEM Journal, vol. 8, no. 03, pp. 48–55, 2019. https://dx.doi.org/10.18421/TEM81-06TalebN.“Prospective applications of blockchain and bitcoin cryptocurrency technology,”TEM Journal80348552019https://dx.doi.org/10.18421/TEM81-06Search in Google Scholar
Gousteris, S., Stamatiou, Y. C., Halkiopoulos, C., Antonopoulou, H., & Kostopoulos, N. (2023). Secure distributed cloud storage based on blockchain technology and smart contracts. Emerging Science Journal, 7(2).GousterisS.StamatiouY. C.HalkiopoulosC.AntonopoulouH.KostopoulosN.2023Secure distributed cloud storage based on blockchain technology and smart contractsEmerging Science Journal72Search in Google Scholar
Singh, S., Rosak-Szyrocka, J., & Tamàndl, L. (2023). Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applications. HighTech and Innovation Journal, 4(1).SinghS.Rosak-SzyrockaJ.TamàndlL.2023Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applicationsHighTech and Innovation Journal41Search in Google Scholar
Ruangkanjanases, A., Hariguna, T., Adiandari, A. M., & Alfawaz, K. M. (2022). Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading need. Emerging Science Journal, 6(5).RuangkanjanasesA.HarigunaT.AdiandariA. M.AlfawazK. M.2022Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading needEmerging Science Journal65Search in Google Scholar
Lee, G. Kim, K & Kim, S. (2020). A Study on the Application of Blockchain Technology in the Construction Industry. KSCE J Civ Eng 24, 2561–2571.LeeG.KimKKimS.2020A Study on the Application of Blockchain Technology in the Construction IndustryKSCE J Civ Eng2425612571Search in Google Scholar