References
- Akhbarifar, S., Javadi, H.H.S., Rahmani, A.M., Hosseinzadeh, M. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput. 2023, 27, 697–713.
- Medileh, S., Laouid, A., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., Khashan, O.A. A flexible encryption technique for the internet of things environment. Ad. Hoc. Netw. 2020, 106, 102240.
- Fuchsbauer, G., Plouviez, A., Seurin, Y. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Cham, Switzerland, 2020; pp. 63–95.
- Zheng, R., Jia, H., Abualigah, L., Liu, Q., Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2020.
- Krichen, M., Mihoub, A., Alzahrani, M.Y., Adoni, W.Y.H., Nahhal, T. Are Formal Methods Applicable to Machine Learning And Artificial Intelligence? In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 9–11 May 2022; pp. 48–53.
- Raman, R., Gupta, N., Jeppu, Y. Framework for Formal Verification of Machine Learning Based Complex System-of-Systems. Insight 2023, 26, 91–102.
- G.S. Reddy, S. Radha, K.T. Taufiq, K.D.S. Reddy, K.P.K. Reddy, P. Nagabushanam. Security based Electronic Voting Machine using Xilinx tool. 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (2022), pp. 1–4, 10.1109/PARC52418.2022.9726556
- V. Bhatt, A.K. Bindal. Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) (2021), pp. 262–265, 10.1109/ISPCC53510.2021.9609399
- X. Xu, H. Zhao, H. Yao, S. Wang. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet of Things Journal, 8 (4) (2021), pp. 2431–2443, 10.1109/JIOT.2020.3030080
- S. Pothumani, A. Arunachalam. Effective Security Mechanisms for Big Data Using Block Chain Technology 2021 International Conference on Computer Communication and Informatics (ICCCI) (2021), pp. 1–6, 10.1109/ICCCI50826.2021.9402458
- R. Shrivastava, A. Tiwary, P. Yadav. Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review 2021 International Conference on Advances in Technology, Management & Education (ICATME) (2021), pp. 238–243, 10.1109/ICATME50232.2021.9732730
- Reddy, G. S., Radha, S., Taufiq, K. T., Reddy, K. D. S., Reddy, K. P. K., & Nagabushanam, P. (2022). Security based electronic voting machine using Xilinx tool. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (pp. 1–4). IEEE.
https://doi.org/10.1109/PARC52418.2022.9726556 - Devibala, A. (2019). A survey on security issues in IoT for blockchain healthcare. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (pp. 1–7). IEEE.
https://doi.org/10.1109/ICECCT.2019.8869253 - Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N., & Ghosh, A. (2021). Blockchain-based model for expanding IoT device data security. In J. C. Bansal, L. C. C. Fung, M. Simic, & A. Ghosh (Eds.), Advances in Applications of Data-Driven Computing (Vol. 1319). Springer, Singapore.
https://doi.org/10.1007/978-981-33-6919-1_5 - Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. Falcon. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 31–41.
- Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. SPHINCS + . In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 141–162.
- Zhang, J., Chen, Y., Zhang, Z. Lattice-Based Programmable Hash Functions and Applications. J. Cryptol. 2024, 37, 4.
- Mehrabi M.A. and Doche C., “Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,” 2019.
https://doi.org/10.3390/info10090285 - Faz-Hernandez A., Lopez J., and Dahab R., “High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,” ACM Transactions on Mathematical Software, vol. 45, no. 3, pp. 1–35, 2019.
https://doi.org/10.1145/3309759 - Hu Z., Gnatyuk S., Kovtun M., and Seilova N., “Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,” Advances in Intelligent Systems and Computing, pp. 309–319, 2018.
https://doi.org/10.1007/978-3-319-91008-6_31 - Islam M.M., Hossain M.S., Hasan M.K., Shahjalal M., and Jang Y.M., “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019.
https://doi.org/10.1109/access.2019.2958491 - Franck C. and Grosschadl J., “Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,” Mobile, Secure, and Programmable Networking, pp. 1–17, 2017.
https://doi.org/10.1007/978-3-319-67807-8_1 - Liu Z., Grosschadl J., Hu Z., Jarvinen K., Wang H., and Verbauwhede I., “Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 773–785, 2017.
https://doi.org/10.1109/tc.2016.2623609 - Liu Z., Weng J., Hu Z., and Seo H., “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 2, pp. 1–18, 2017.
https://doi.org/10.1145/2967103 - Naresh V.S., Reddi S., and Allavarpu V.D., “Blockchain-based patient centric health care communication system,” International Journal of Communication Systems, vol. 34, no. 7, pp. 34–34, 2021.
https://doi.org/10.1002/dac.4749 - Saini A., Zhu Q., Singh N., Xiang Y., Gao L., and Zhang Y., “A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,” IEEE IoT Journal, vol. 8, no. 7, pp. 5914–5925, 2021.
https://doi.org/10.1109/jiot.2020.3032997 - Jasem F.M., Sagheer A.M., and Awad A.M., “Enhancement of digital signature algorithm in bitcoin wallet,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 1, pp. 449–457, 2021.
https://doi.org/10.11591/eei.v10i1.2339 - Sadiq A., Javed M.U., Khalid R., Almogren A., Shafiq M., and Javaid N., “Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,” IEEE Access, vol. 9, pp. 7000–7020, 2021.
https://doi.org/10.1109/access.2020.3048169 - Arulprakash M. and Jebakumar R., “Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,” The Journal of Supercomputing, 2021.
https://doi.org/10.1007/s11227-021-03756-x - Kavin BP, Ganapathy S., Kanimozhi U., and Kannan A., “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” 2020.
https://doi.org/10.1007/s11277-020-07613-7 - Benil T. and Jasper J., “Cloud-based security on outsourcing using blockchain in E-health systems Computer Networks, vol. 178, pp. 107344–107344, 2020.
https://doi.org/10.1016/j.comnet.2020.107344 - Wang H., He D., and Ji Y., “Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, “Future Generation Computer Systems, vol. 107, pp. 854–862, 2020.
https://doi.org/10.1016/j.future.2017.06.028 - Kumar M., Chand S., and Katti C.P., “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal, vol. 14, no. 2, pp. 2032–2041, 2020.
https://doi.org/10.1109/jsyst.2019.2940474 - Li X., Mei Y., Gong J., Xiang F., and Sun Z., “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020.
https://doi.org/10.1109/access.2020.2987831 - Ernest B. and Shiguang J., “Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,” IEEE Access, vol. 8, pp. 25863–25876, 2020.
https://doi.org/10.1109/access.2020.2968621 - Zhang X., Zhou Z., Zhang J., Xu C., and Zhang X., “Efficient lightweight private auditing scheme for cloud-based wireless body area networks,” International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 139–139, 2020.
https://doi.org/10.1504/ijesdf.2020.10027592 - Ansah AKK and Gyamfi D.A., “Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,” International Journal of Computational Science and Engineering, vol. 23, no. 4, 2020.
https://doi.org/10.1504/ijcse.2020.10035561 - Chen C.L., Deng Y.Y., Weng W., Chen C.H., Chiu Y.J., and Wu C.M., “A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,” Electronics, vol. 9, no. 1, 2020.
https://doi.org/10.3390/electronics9010062 - Ullah I., Amin N.U., Almogren A., Khan M.A., Uddin M.I., and Hua Q., “A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,” IEEE Access, vol. 8, pp. 199197–199212, 2020.
https://doi.org/10.1109/access.2020.3033758 - Zhang X., Zhao J., Mu L., Tang Y., and Xu C., “Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,” Pervasive and Mobile Computing, vol. 56, pp. 18–28, 2019.
https://doi.org/10.1016/j.pmcj.2019.03.004 - Taleb N., “Prospective applications of blockchain and bitcoin cryptocurrency technology,” TEM Journal, vol. 8, no. 03, pp. 48–55, 2019.
https://dx.doi.org/10.18421/TEM81-06 - Gousteris, S., Stamatiou, Y. C., Halkiopoulos, C., Antonopoulou, H., & Kostopoulos, N. (2023). Secure distributed cloud storage based on blockchain technology and smart contracts. Emerging Science Journal, 7(2).
- Singh, S., Rosak-Szyrocka, J., & Tamàndl, L. (2023). Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applications. HighTech and Innovation Journal, 4(1).
- Ruangkanjanases, A., Hariguna, T., Adiandari, A. M., & Alfawaz, K. M. (2022). Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading need. Emerging Science Journal, 6(5).
- Lee, G. Kim, K & Kim, S. (2020). A Study on the Application of Blockchain Technology in the Construction Industry. KSCE J Civ Eng 24, 2561–2571.