Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (224)

Search Parameters:
Keywords = Certificate Authority

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2034 KiB  
Article
Security Assessment of Smart Contract Integration and Wallet Interaction in Decentralized Applications: A Case Study of BlockScribe
by Andrzej Wilczyński and Gabriela Jasnosz
Appl. Sci. 2025, 15(15), 8473; https://doi.org/10.3390/app15158473 - 30 Jul 2025
Viewed by 197
Abstract
Smart contracts and cryptocurrency wallets are foundational components of decentralized applications (dApps) on blockchain platforms such as Ethereum. While these technologies enable secure, transparent, and automated transactions, their integration also introduces complex security challenges. This study presents a security-oriented analysis of smart contract [...] Read more.
Smart contracts and cryptocurrency wallets are foundational components of decentralized applications (dApps) on blockchain platforms such as Ethereum. While these technologies enable secure, transparent, and automated transactions, their integration also introduces complex security challenges. This study presents a security-oriented analysis of smart contract and wallet integration, focusing on BlockScribe—a decentralized Ethereum-based application for digital record certification. We systematically identify and categorize security risks arising from the interaction between wallet interfaces and smart contract logic. In particular, we analyze how user authorization flows, transaction design, and contract modularity affect the security posture of the entire dApp. To support our findings, we conduct an empirical evaluation using static analysis tools and formal verification methods, examining both contract-level vulnerabilities and integration-level flaws. Our results highlight several overlooked attack surfaces in wallet–contract communication patterns, including reentrancy amplification, permission mismanagement, and transaction ordering issues. We further discuss implications for secure dApp development and propose mitigation strategies that improve the robustness of wallet–contract ecosystems. This case study contributes to a deeper understanding of integration-layer vulnerabilities in blockchain-based systems and offers practical guidance for developers and auditors aiming to strengthen smart contract security. Full article
(This article belongs to the Special Issue Blockchain-Based Networks: Security, Privacy, and Applications)
Show Figures

Figure 1

33 pages, 1146 KiB  
Article
Impact of Security Management Activities on Corporate Performance
by Hyunwoo Cho and Keuntae Cho
Systems 2025, 13(8), 633; https://doi.org/10.3390/systems13080633 - 28 Jul 2025
Viewed by 178
Abstract
The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents. Grounded in the resource-based view and in contingency theory, this study adopts a different approach from prior research by conceptualizing security management activities [...] Read more.
The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents. Grounded in the resource-based view and in contingency theory, this study adopts a different approach from prior research by conceptualizing security management activities not as mere risk control mechanisms, but as strategic innovation drivers that can enhance corporate performance (sales revenue and operating profit). The authors develop a research model with six independent variables, including internal and external security management activities, CISO role configuration (independent or dual-role with CIO), and investment levels in IT and information security. The dependent variables include sales revenue and operating profit, with ISMS or ISO certification as a moderating variable. Using information security (IS) disclosures and financial data from 545 Korean firms that have reported their security management activities to the Ministry of Science and ICT, multiple regression and moderation analyses reveal that high IT investment negatively impacts performance, but this effect is mitigated when formal security systems, like ISMS or ISO, are in place. The results suggest that integrating recognized security frameworks into management strategies can enhance both innovation and financial outcomes, encouraging a proactive approach to security management. Full article
Show Figures

Figure 1

25 pages, 2183 KiB  
Article
Advancing Semantic Enrichment Compliance in BIM: An Ontology-Based Framework and IDS Evaluation
by Tomo Cerovšek and Mohamed Omar
Buildings 2025, 15(15), 2621; https://doi.org/10.3390/buildings15152621 - 24 Jul 2025
Viewed by 409
Abstract
As BIM projects grow in volume and complexity, automated Information Compliance Checking (ICC) is becoming essential to meet demanding regulatory and contractual requirements. This study presents novel controlled vocabularies and processes for the management of information requirements, along with a structured evaluation of [...] Read more.
As BIM projects grow in volume and complexity, automated Information Compliance Checking (ICC) is becoming essential to meet demanding regulatory and contractual requirements. This study presents novel controlled vocabularies and processes for the management of information requirements, along with a structured evaluation of the Information Delivery Specification (IDS) and its associated tools. The controlled vocabularies are important as they provide support to standardization, information retrieval, data-driven workflows, and AI integration. Information requirements are classified by input type and project interaction context (phase, origin, project role, and communication), as well as by applicability (data management function, model granularity, BIM usage, and checkability). The ontology comprises seven categories: identity, geometry, design/performance, fabrication/construction, operation/maintenance, cost, and regulatory category, each linked to verification principles such as uniqueness and consistency. This enables systematic implementation of validation checks aligned with company and project needs. We introduce three ICC workflows in relation to the BIM authoring tools (inside, outside, and hybrid) and suggest key criteria for the functional and non-functional evaluation of IDS tools. Empirical results from a real project using five IDS tools reveal implementation issues with the classification facet, regular expressions, and issue reporting. The proposed ontology and framework lay the foundation for a scalable, transparent ICC within openBIM. The results also provide ICC process guidance for practitioners, a SWOT analysis that can inform enhancements to the existing IDS schema, identify possible inputs for certification of IDS tools, and generate innovative ideas for research and development. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
Show Figures

Figure 1

15 pages, 1463 KiB  
Review
Preventing Microorganism Contamination in Starting Active Materials for Synthesis from Global Regulatory Agencies: Overview for Public Health Implications
by Francesco Gravante, Francesco Sacchini, Stefano Mancin, Diego Lopane, Mauro Parozzi, Gaetano Ferrara, Marco Sguanci, Sara Morales Palomares, Federico Biondini, Francesca Marfella, Giovanni Cangelosi, Gabriele Caggianelli and Fabio Petrelli
Microorganisms 2025, 13(7), 1595; https://doi.org/10.3390/microorganisms13071595 - 6 Jul 2025
Viewed by 499
Abstract
Starting Active Materials for Synthesis (SAMS) represents a critical stage in drug manufacturing, directly influencing the microbiological quality and safety of the final product. The introduction of SAMS marks the point where Good Manufacturing Practices (GMP) begin to apply, which are essential for [...] Read more.
Starting Active Materials for Synthesis (SAMS) represents a critical stage in drug manufacturing, directly influencing the microbiological quality and safety of the final product. The introduction of SAMS marks the point where Good Manufacturing Practices (GMP) begin to apply, which are essential for ensuring sterility and preventing microbial contamination during the synthesis process. However, defining the exact point in the process that qualifies as the SAMS is subject to uncertainties, as earlier stages are not always governed by stringent GMP standards. The regulatory differences between various countries further contribute to this issue. This study explores the implications of SAMS selection and use in relation to sterility and infection control, analyzing the guidelines of major Regulatory Authorities and comparing their approaches to GMP. Regulations from several international regulatory agencies were examined, with a particular focus on microbiological control measures and infection protection in the SAMS manufacturing process. The analysis focused on the microbiological control requirements and safety measures applicable to the stages preceding the introduction of SAMS into the production of the final Active Pharmaceutical Ingredients (APIs). Documents published between 2015 and 2025 were included based on predefined criteria regarding relevance, accessibility, and regulatory authority. The analysis revealed significant discrepancies between regulations regarding the definition and management of SAMS. In particular, the regulations in Mexico and India have notable gaps, failing to provide clear guidelines on SAMS sterility and protection against infectious contamination. Conversely, China has introduced risk-based approaches and early-stage microbiological controls, especially for sterile products, aligning with international standards. The European Medicines Agency (EMA), the U.S. Food and Drug Administration (FDA), the Pharmaceutical Inspection Co-operation Scheme (PIC/S), and the World Health Organization (WHO) have well-established systems for microbiological quality control of SAMS, including rigorous measures for the validation of suppliers and risk management to ensure that SAMS does not compromise the microbiological safety of the final product. The regulations in Brazil and Canada introduce additional measures to protect the microbiological quality of SAMS, with specifications for contamination control and certification of critical stages. The lack of a harmonized language for the definition of SAMS, coupled with a fragmented regulatory framework, presents a challenge for infection protection in pharmaceutical manufacturing. Key issues include the absence of specific regulations for stages prior to the introduction of SAMS and the lack of standards for inspections related to these stages. A desirable solution would be the mandatory extension of GMPs to the stages before SAMS introduction, with centralized control to ensure sterility and protection against infection throughout the entire manufacturing process. Full article
Show Figures

Figure 1

13 pages, 1178 KiB  
Article
Study of the Possibility of Transition to More Stringent Energy Efficiency Requirements for Translucent Structures in the Republic of Kazakhstan
by Serikbolat Yessengabulov, Meiram Kozhakhmet, Yerkebulan Zharkenov, Yeldos Abakanov, Gulzhamal Dastenova, Marzhan Nurbayeva, Aru Kozhakhmet, Meiir Zhankeldi and Assel Jexembayeva
Buildings 2025, 15(13), 2354; https://doi.org/10.3390/buildings15132354 - 4 Jul 2025
Viewed by 240
Abstract
The article discusses issues related to improving the energy efficiency of translucent structures (hereinafter referred to as windows) in the construction of buildings in the Republic of Kazakhstan. An analysis of the current regulatory requirements for the thermal insulation of windows and other [...] Read more.
The article discusses issues related to improving the energy efficiency of translucent structures (hereinafter referred to as windows) in the construction of buildings in the Republic of Kazakhstan. An analysis of the current regulatory requirements for the thermal insulation of windows and other translucent structures, depending on the climatic conditions of the construction region, was carried out. The authors propose a schematic map of the climatic regions of the Republic of Kazakhstan and stricter values for the thermal resistance of windows depending on the degree-days of the heating period, which will significantly reduce heat loss in buildings and cut heating costs. Calculations of potential energy savings and economic benefits from the introduction of energy-efficient windows are presented, and schemes for the certification and labeling of windows by energy efficiency class are proposed. The work is based on an analysis of national standards and international experience and is aimed at supporting sustainable construction and the implementation of Kazakhstan’s climate commitments. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

25 pages, 7476 KiB  
Article
Image Encryption with Dual Watermark Based on Chaotic Map
by Ran Chu, Jun Mou and Yuanhui Cui
Cryptography 2025, 9(3), 49; https://doi.org/10.3390/cryptography9030049 - 1 Jul 2025
Viewed by 586
Abstract
A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequence is generated. The encrypted [...] Read more.
A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequence is generated. The encrypted copyright image is fused with the feature value of the original image and then encrypted again to form zero-watermarking, which is registered with the copyright certification authority. The zero-watermarking is taken as a robust watermark and embedded into the original image based on a chaotic sequence to ensure its invisibility. Finally, a cross-mutation DNA encryption is proposed. The experimental results verify the performance of encryption and dual watermark copyright authentication, and the ability to resist attacks. Full article
Show Figures

Figure 1

33 pages, 8285 KiB  
Article
TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
by Hisham Ali, William J. Buchanan, Jawad Ahmad, Marwan Abubakar, Muhammad Shahbaz Khan and Isam Wadhaj
Future Internet 2025, 17(7), 289; https://doi.org/10.3390/fi17070289 - 27 Jun 2025
Viewed by 464
Abstract
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture supports fine-grained access control and immutability through smart contract-enforced trust policies. The system combines Ciphertext-Policy [...] Read more.
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture supports fine-grained access control and immutability through smart contract-enforced trust policies. The system combines Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with temporal, spatial, and controlled revelation constraints to grant data owners precise control over shared intelligence. To ensure scalable decentralized storage, encrypted CTI is distributed via the IPFS, with blockchain-anchored references ensuring verifiability and traceability. Using STIX for structuring and TAXII for exchange, the framework complies with the GDPR requirements, embedding revocation and the right to be forgotten through certificate authorities. The experimental validation demonstrates that TrustShare achieves low-latency retrieval, efficient encryption performance, and robust scalability in containerized deployments. By unifying decentralized technologies with cryptographic enforcement and regulatory compliance, TrustShare sets a foundation for the next generation of sovereign and trustworthy threat intelligence collaboration. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

17 pages, 516 KiB  
Article
Balancing Objectivity and Welfare: Physiological and Behavioural Responses of Guide Dogs During an Independent Certification Protocol
by Viola Faerber-Morak, Lisa-Maria Glenk, Karl Weissenbacher and Annika Bremhorst
Animals 2025, 15(13), 1896; https://doi.org/10.3390/ani15131896 - 26 Jun 2025
Viewed by 1371
Abstract
Guide dogs are essential in supporting the autonomy of blind and visually impaired individuals. Austria is the first country to implement a legally mandated, two-stage certification protocol for the official recognition of guide dogs, assessed by an independent authority. The first stage includes [...] Read more.
Guide dogs are essential in supporting the autonomy of blind and visually impaired individuals. Austria is the first country to implement a legally mandated, two-stage certification protocol for the official recognition of guide dogs, assessed by an independent authority. The first stage includes two evaluation phases: the dog guides its familiar trainer (Phase 1) and then an unfamiliar blind tester (Phase 2). While Phase 2 ensures an objective assessment of guiding performance, it may also introduce stress due to the unfamiliar handler and separation from the trainer that could impact welfare and behaviour. This study aimed to evaluate whether Phase 2 of the Austrian evaluation protocol elicits higher stress than Phase 1 in guide dogs and, hence, needs to be refined in this regard by comparing physiological and behavioural responses between the two test phases. Fourteen guide dogs were assessed during real evaluations. Salivary cortisol was collected before the evaluation day and at several time points on the evaluation day (before and after each phase). Behavioural responses were coded from video recordings of the first 5 and 15 min of each phase, including stress-related behaviours, task-related performance behaviours, and handler behaviours. Cortisol levels did not differ significantly between the phases. Dogs turned around significantly more often in Phase 2, potentially seeking reassurance, but showed a non-significant trend toward fewer stress-related behaviours. Verbal praise occurred more frequently with the unfamiliar tester. These findings suggest that the current evaluation protocol does not induce substantial physiological or behavioural stress when dogs are guided by an unfamiliar tester, supporting its continued use as a welfare-conscious and objective certification approach that could also potentially serve as a model for other countries. Full article
(This article belongs to the Special Issue Assistance Dogs—What Should We Focus On)
Show Figures

Figure 1

25 pages, 1083 KiB  
Article
STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange
by Jiexin Zheng, Mudi Xu, Jianqing Li, Benfeng Chen, Zhizhong Tan, Anyu Wang, Shuo Zhang, Yan Liu, Kevin Qi Zhang, Lirong Zheng and Wenyong Wang
Electronics 2025, 14(12), 2399; https://doi.org/10.3390/electronics14122399 - 12 Jun 2025
Viewed by 419
Abstract
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems [...] Read more.
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems face multiple challenges in trans-border contexts. Firstly, the transnational transfer of identity data struggles to meet the varying data-compliance requirements across different jurisdictions. Secondly, centralized authentication architectures exhibit vulnerabilities in trust chains, where single points of failure may lead to systemic risks. Thirdly, the inefficiency of certificate verification in traditional Public Key Infrastructure (PKI) systems fails to meet the real-time response demands of globalized business operations. These limitations severely constrain real-time identity verification in international business scenarios. To address these issues, this study proposes a trans-border distributed certificate-free identity authentication framework (STALE). The methodology adopts three key innovations. Firstly, it utilizes email addresses as unique user identifiers combined with a Certificateless Public Key Cryptography (CL-PKC) system for key distribution, eliminating both single-point dependency on traditional Certificate Authorities (CAs) and the key escrow issues inherent in Identity-Based Cryptography (IBC). Secondly, an enhanced Elliptic Curve Diffie–Hellman (ECDH) key-exchange protocol is introduced, employing forward-secure session key negotiation to significantly improve communication security in trans-border network environments. Finally, a distributed identity ledger is implemented, using the FISCO BCOS blockchain, enabling decentralized storage and verification of identity information while ensuring data immutability, full traceability, and General Data Protection Regulation (GDPR) compliance. Our experimental results demonstrate that the proposed method exhibits significant advantages in authentication efficiency, communication overhead, and computational cost compared to existing solutions. Full article
Show Figures

Figure 1

42 pages, 6696 KiB  
Article
Design, Implementation and Practical Energy-Efficiency Evaluation of a Blockchain Based Academic Credential Verification System for Low-Power Nodes
by Gabriel Fernández-Blanco, Iván Froiz-Míguez, Paula Fraga-Lamas and Tiago M. Fernández-Caramés
Appl. Sci. 2025, 15(12), 6596; https://doi.org/10.3390/app15126596 - 12 Jun 2025
Viewed by 563
Abstract
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a [...] Read more.
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a significant cost to society, since fraud harms the trustworthiness of certificates and academic institutions. To tackle such an issue, this article proposes a solution aimed at recording and verifying academic records through a decentralized application that is supported by a smart contract deployed in the Ethereum blockchain and by a decentralized storage system based on Inter-Planetary File System (IPFS). The proposed solution is evaluated in terms of performance and energy efficiency, comparing the results obtained with a traditional Proof-of-Work (PoW) consensus protocol and the new Proof-of-Authority (PoA) protocol. The results shown in this paper indicate that the latter is clearly greener and demands less CPU load. Moreover, this article compares the performance of a traditional computer and two Single-Board Computers (SBCs) (a Raspberry Pi 4 and an Orange Pi One), showing that is possible to make use of the latter low-power devices to implement blockchain nodes but at the cost of higher response latency. Furthermore, the impact of Ethereum gas limit is evaluated, demonstrating its significant influence on the blockchain network performance. Thus, this article provides guidelines, useful practical evaluations and key findings that will help the next generation of green blockchain developers and researchers. Full article
Show Figures

Figure 1

36 pages, 889 KiB  
Review
Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods
by Mohammad Jaminur Islam, Saminur Islam, Mahmud Hossain, Shahid Noor and S. M. Riazul Islam
Future Internet 2025, 17(5), 205; https://doi.org/10.3390/fi17050205 - 3 May 2025
Viewed by 2081
Abstract
Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and IoT applications in healthcare continue to accelerate. Although these innovations [...] Read more.
Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and IoT applications in healthcare continue to accelerate. Although these innovations promise significant improvements, security remains a critical challenge. Blockchain offers a secure foundation for integrating diverse technologies; however, vulnerabilities—including adversarial exploits—can undermine performance and compromise application reliability. To address these risks effectively, it is essential to comprehensively analyze the vulnerability landscape of blockchain systems. This paper contributes in two key ways. First, it presents a unique layer-based framework for analyzing and illustrating security attacks within blockchain architectures. Second, it introduces a novel taxonomy that classifies existing research on blockchain vulnerability detection. Our analysis reveals that while ML and deep learning offer promising approaches for detecting vulnerabilities, their effectiveness often depends on access to extensive and high-quality datasets. Additionally, the layer-based framework demonstrates that vulnerabilities span all layers of a blockchain system, with attacks frequently targeting the consensus process, network integrity, and smart contract code. Overall, this paper provides a comprehensive overview of blockchain security threats and detection methods, emphasizing the need for a multifaceted approach to safeguard these evolving systems. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT—3rd Edition)
Show Figures

Graphical abstract

30 pages, 8843 KiB  
Article
An AIoT Architecture for Structural Testing: Application to a Real Aerospace Component (Embraer E2 Model Aircraft Flag Track)
by Pablo Venegas, Unai Virto, Isidro Calvo and Oscar Barambones
Appl. Sci. 2025, 15(9), 4625; https://doi.org/10.3390/app15094625 - 22 Apr 2025
Viewed by 660
Abstract
The AIoT paradigm, which combines AI with IoT, offers great advantages in manufacturing processes. However, its use in aeronautical testing is still incipient, since this kind of test must ensure strict safety requirements. This study presents one AIoT architecture aimed at structurally testing [...] Read more.
The AIoT paradigm, which combines AI with IoT, offers great advantages in manufacturing processes. However, its use in aeronautical testing is still incipient, since this kind of test must ensure strict safety requirements. This study presents one AIoT architecture aimed at structurally testing aeronautical applications that ease the integration of AI techniques to interpret the data obtained by wireless IoT devices. In addition, the authors propose implementation guidelines for developers. The presented approach was experimentally validated in the rigorous and standardized certification test of a real aerospace component, namely a flag track component of the Embraer E2 model aircraft. Recorded magnitudes with IoT devices were compared with the data obtained using conventional technologies in terms of the quality of information and compliance with the requirements of aeronautical regulations. In order to illustrate the integration of different AI techniques in the AIoT architecture, ARIMA and LSTM algorithms were used to analyze the data captured with three sensors. The obtained results proved that the AIoT architecture is valid in structural testing applications, achieving a reduction in cabling and deployment time as well as improving flexibility and scalability. The presented approach paves the way to introduce AI-based algorithms for analyzing, either in run-time and off-line, the structural testing results obtained by means of IoT devices. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

31 pages, 3781 KiB  
Review
Hydrogen Properties and Their Safety Implications for Experimental Testing of Wing Structure-Integrated Hydrogen Tanks
by Javed A. Butt and Johannes F. C. Markmiller
Energies 2025, 18(8), 1930; https://doi.org/10.3390/en18081930 - 10 Apr 2025
Viewed by 680
Abstract
Hydrogen is a promising candidate for addressing environmental challenges in aviation, yet its use in structural validation tests for Wing Structure-Integrated high-pressure Hydrogen Tanks (SWITHs) remains underexplored. To the best of the authors’ knowledge, this study represents [...] Read more.
Hydrogen is a promising candidate for addressing environmental challenges in aviation, yet its use in structural validation tests for Wing Structure-Integrated high-pressure Hydrogen Tanks (SWITHs) remains underexplored. To the best of the authors’ knowledge, this study represents the first attempt to assess the feasibility of conducting such tests with hydrogen at aircraft scales. It first introduces hydrogen’s general properties, followed by a detailed exploration of the potential hazards associated with its use, substantiated by experimental and simulation results. Key factors triggering risks, such as ignition and detonation, are identified, and methods to mitigate these risks are presented. While the findings affirm that hydrogen can be used safely in aviation if responsibly managed, they caution against immediate large-scale experimental testing of SWITHs due to current knowledge and technology limitations. To address this, a roadmap with two long-term objectives is outlined as follows: first, enabling structural validation tests at scales equivalent to large aircraft for certification; second, advancing simulation techniques to complement and eventually reduce reliance on costly experiments while ensuring sufficient accuracy for SWITH certification. This roadmap begins with smaller-scale experimental and numerical studies as an initial step. Full article
(This article belongs to the Special Issue Renewable Fuels: A Key Step Towards Global Sustainability)
Show Figures

Figure 1

23 pages, 2410 KiB  
Article
A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control
by Chung-Yen Wu, Kuo-Hsuan Huang and Chih-Yao Hsu
Appl. Sci. 2025, 15(7), 3890; https://doi.org/10.3390/app15073890 - 2 Apr 2025
Cited by 3 | Viewed by 743
Abstract
This study presents a decentralised ciphertext-policy attribute-based encryption (CP-ABE) scheme designed for secure and efficient access control in resource-constrained Internet-of-Things (IoT) environments. By utilising multi-authority architecture and outsourced computation, the scheme enhances scalability, simplifies key management by eliminating reliance on a certificate authority [...] Read more.
This study presents a decentralised ciphertext-policy attribute-based encryption (CP-ABE) scheme designed for secure and efficient access control in resource-constrained Internet-of-Things (IoT) environments. By utilising multi-authority architecture and outsourced computation, the scheme enhances scalability, simplifies key management by eliminating reliance on a certificate authority (CA), and ensures data confidentiality through randomised proxy keys. It is particularly suited for multi-scenario IoT applications involving information sharing, such as smart cities or industrial automation in strategic alliances or conglomerates. Demonstrating security against chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption, the scheme offers a practical and scalable solution for decentralised access control. Full article
Show Figures

Figure 1

21 pages, 15989 KiB  
Article
Deformation Characterization of Glass Fiber and Carbon Fiber-Reinforced 3D Printing Filaments Using Digital Image Correlation
by Vivien Nemes, Szabolcs Szalai, Brigitta Fruzsina Szívós, Mykola Sysyn, Dmytro Kurhan and Szabolcs Fischer
Polymers 2025, 17(7), 934; https://doi.org/10.3390/polym17070934 - 29 Mar 2025
Viewed by 880
Abstract
The paper offers an in-depth deformation study of glass fiber-reinforced and carbon composite filaments of 3D printers. During the certification, the authors used DIC (Digital Image Correlation) as a full-field strain measurement technique to explore key material traits as a non-contact optical measurement [...] Read more.
The paper offers an in-depth deformation study of glass fiber-reinforced and carbon composite filaments of 3D printers. During the certification, the authors used DIC (Digital Image Correlation) as a full-field strain measurement technique to explore key material traits as a non-contact optical measurement method. The insights captured through the DIC technology enabled to better understand the localized strain distributions during the loading of these reinforced filaments. The paper analyzes the glass fiber and carbon fiber filaments used in 3D printing that are reinforced with these materials and are subjected to bending and compressive loading. The segment presents how loading affects the performance of reinforced filaments when varying such factors as the deposition patterns, layer orientation, and other process parameters. Different types and combinations of reinforcements and printing variables were tested, and the resulting dependencies of mechanical parameters and failure modes were established for each case. Key conclusions demonstrate that the mechanical behavior of both carbon- and glass fiber-reinforced filaments is strongly affected by the 3D printing parameters, particularly infill density, pattern, and build orientation. The application of Digital Image Correlation (DIC) allowed for a precise, full-field analysis of strain distribution and deformation behavior, offering new insights into the structural performance of fiber-reinforced 3D printed composites. The findings from the study provide guidance for the proper choice of filling material and the optimal parameters for the 3D printing process of models with high-performance indexes and seamless applications in the automotive and industrial manufacturing sectors. Full article
(This article belongs to the Special Issue Modeling of Polymer Composites and Nanocomposites)
Show Figures

Figure 1

Back to TopTop