Skip Content
You are currently on the new version of our website. Access the old version .

8 Results Found

  • Article
  • Open Access
1,645 Views
32 Pages

20 May 2025

Virtual Trusted Platform Modules (vTPMs) are widely adopted in commercial cloud platforms such as VMware Cloud, Google Cloud, Microsoft Azure, and Amazon AWS. However, as software-based components, vTPMs do not provide the same security guarantees as...

  • Article
  • Open Access
777 Views
18 Pages

28 April 2025

As security issues in vehicular networks continue to intensify, ensuring the trustworthiness of message exchanges among vehicles, infrastructure, and cloud platforms has become increasingly critical. Although trust authentication serves as a fundamen...

  • Review
  • Open Access
10 Citations
5,181 Views
30 Pages

8 April 2025

Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and tru...

  • Article
  • Open Access
17 Citations
4,420 Views
21 Pages

22 June 2022

The digitalization and adoption of advanced technologies in supply chain and logistics not only change the business model but also transfer logistics infrastructure to a service-oriented architecture and introduce new avenues concerning supply chain...

  • Article
  • Open Access
30 Citations
5,075 Views
20 Pages

14 September 2023

In the modern agricultural landscape, realizing data’s full potential requires a unified infrastructure where stakeholders collaborate and share their data to gain insights and create business value. The agricultural data ecosystem (ADE) serves...

  • Article
  • Open Access
16 Citations
3,681 Views
15 Pages

A Blockchain-Enabled Distributed Advanced Metering Infrastructure Secure Communication (BC-AMI)

  • Nahida Islam,
  • Md. Sazzadur Rahman,
  • Imtiaz Mahmud,
  • Md. Nur Amin Sifat and
  • You-Ze Cho

20 July 2022

The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes...

  • Article
  • Open Access
534 Views
29 Pages

Modern cryptographic systems increasingly depend on certified hardware modules to guarantee trustworthy key management, tamper resistance, and secure execution across Internet of Things (IoT), embedded, and cloud infrastructures. Although numerous FI...

  • Article
  • Open Access
13 Citations
6,298 Views
17 Pages

25 July 2019

Real-time data about various traffic events and conditions—offences, accidents, dangerous driving, or dangerous road conditions—is crucial for safe and efficient transportation. Unlike roadside infrastructure data which are often limited...