Robert et al., 2023
| Publication | Publication Date | Title |
|---|---|---|
| Velmurugadass et al. | Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm | |
| Khalil et al. | A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent advances, and future research directions | |
| US9967333B2 (en) | Deferred configuration or instruction execution using a secure distributed transaction ledger | |
| JP2019515534A (en) | Method and system for controlling contract execution using distributed hash tables and peer-to-peer distributed ledgers | |
| CN115391749A (en) | Method and system for securing computer software using distributed hash table and blockchain | |
| Ahmad et al. | Machine learning-based intelligent security framework for secure cloud key management | |
| WO2023046409A1 (en) | Digital asset platform with hsm verification | |
| Mahmood et al. | Blockchain technology and internet of things: review, challenge and security concern | |
| Mayuranathan et al. | RETRACTED ARTICLE: Enhanced security in cloud applications using emerging blockchain security algorithm | |
| CN112074861A (en) | Block chain based messaging service for time sensitive events | |
| Kumar et al. | The blockchain technology for secure and smart applications across industry verticals | |
| Al Neyadi et al. | Role-based access control in private blockchain for iot integrated smart contract | |
| Sharma et al. | A two-tier security solution for storing data across public cloud | |
| Ullah et al. | Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things | |
| Poberezhnyk et al. | Developing of Blockchain Method in Message Interchange Systems. | |
| Das et al. | Data privacy in IoT network using blockchain technology | |
| Robert et al. | Block Chain based Malware Detection System for Smartphone Application | |
| Subha | Assessing security features of blockchain technology | |
| Gattoju et al. | Design of ChaApache framework for securing Hadoop application in big data | |
| Chenli et al. | Provnet: Networked blockchain for decentralized secure provenance | |
| Barde | Blockchain-based cyber security | |
| Mahlous et al. | The adoption of blockchain technology in iot: An insight view | |
| Khan et al. | The applications of blockchains in addressing the integration and security of iot systems: A survey | |
| Eshan et al. | Deficiencies in blockchain technology and potential augmentation in cyber security | |
| Gandhi et al. | Blockchain technology: Concept, applications, challenges, and security threats |