International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
A hybrid blockchain proposal to improve valued added tax recovery 一项改善增值税回收的混合b区块链提案
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10042220
C. Gaie, M. Mueck
{"title":"A hybrid blockchain proposal to improve valued added tax recovery","authors":"C. Gaie, M. Mueck","doi":"10.1504/ijitst.2022.10042220","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10042220","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel verification framework to analyse security attacks in a fingerprint authentication system 一种分析指纹认证系统中安全攻击的新型验证框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10049155
K. Nair, D. Harikrishnan, Shelbi Joseph, N. Sunilkumar
{"title":"A novel verification framework to analyse security attacks in a fingerprint authentication system","authors":"K. Nair, D. Harikrishnan, Shelbi Joseph, N. Sunilkumar","doi":"10.1504/ijitst.2022.10049155","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10049155","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced security framework for IoT environment using Jaya optimisation based genetic algorithm 使用基于Jaya优化的遗传算法的物联网环境增强安全框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10047960
Ch. Madhubabu, P. Jancy, S. Pandiaraj, Iwin Thanakumar Joseph, S. Velliangiri
{"title":"An enhanced security framework for IoT environment using Jaya optimisation based genetic algorithm","authors":"Ch. Madhubabu, P. Jancy, S. Pandiaraj, Iwin Thanakumar Joseph, S. Velliangiri","doi":"10.1504/ijitst.2022.10047960","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047960","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection using predictive features and machine learning algorithms 使用预测特征和机器学习算法的信用卡欺诈检测
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10051923
Naoufal Rtayli, N. Enneya
{"title":"Credit card fraud detection using predictive features and machine learning algorithms","authors":"Naoufal Rtayli, N. Enneya","doi":"10.1504/ijitst.2022.10051923","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10051923","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coded cooperative trust derivation for internet of things 面向物联网的编码合作信任派生
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10047056
Vidushi Sharma, Gamini Joshi
{"title":"Coded cooperative trust derivation for internet of things","authors":"Vidushi Sharma, Gamini Joshi","doi":"10.1504/ijitst.2022.10047056","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047056","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain technology for protection of biomedical documents in healthcare society 区块链技术在医疗保健社会的生物医学文件保护
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10047205
M. Kumar, A. Srivastava, R. Jayaraman
{"title":"Blockchain technology for protection of biomedical documents in healthcare society","authors":"M. Kumar, A. Srivastava, R. Jayaraman","doi":"10.1504/ijitst.2022.10047205","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047205","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient way in sharing of IoT data and uses of blockchain in auditing the stored data 物联网数据共享的高效方式和区块链在审计存储数据中的使用
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.119669
A. J. Lyimo, K. A. Kumar
{"title":"Efficient way in sharing of IoT data and uses of blockchain in auditing the stored data","authors":"A. J. Lyimo, K. A. Kumar","doi":"10.1504/ijitst.2022.119669","DOIUrl":"https://doi.org/10.1504/ijitst.2022.119669","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and detection mechanism in IoT-based cloud computing using hybrid approach 基于物联网的混合云计算安全检测机制
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040779
Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel
{"title":"Security and detection mechanism in IoT-based cloud computing using hybrid approach","authors":"Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel","doi":"10.1504/ijitst.2021.10040779","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040779","url":null,"abstract":"The combination of RSA and RC4 is accepted for the generation of key to get the superior security method, on image, blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. If those files are demanded by the other cloud user's then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm. The whole parametric comparison implies that the performance of our framework outperforms over traditional techniques.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42423505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An architecture for enabling IoT interoperability between cross-platforms 实现跨平台物联网互操作性的架构
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040788
Venkateswara Raju Konduru, Manjula R. Bharamagoudra
{"title":"An architecture for enabling IoT interoperability between cross-platforms","authors":"Venkateswara Raju Konduru, Manjula R. Bharamagoudra","doi":"10.1504/ijitst.2021.10040788","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040788","url":null,"abstract":"The internet of things (IoT) continues to evolve and more and more IoT platforms provide access to things. However, IoT's ability lies in the development of cross-domain IoT ecosystems in these platforms, offering new, unexpected applications and value-added services. We have identified two key perspectives critical to the development of an IoT ecosystem: 1) enable interoperability between platform development and cross-platform implementation of applications on internet platforms; 2) market (or trade centre) to exchange and adapt IoT resources. Given these two important perspectives of an IoT ecosystem, this article introduces the bridging the interoperability gap (BIG) IoT architecture as the basis for the creation of IoT ecosystems. Architecture responds to key needs that have been evaluated by industry and research associations as a key aspect of the BIG IoT project. We present a proof of the application of the concept in the context of a smart healthcare scenario. We adopted the generic RESTful application programming interface (API) methodology to detect and interact the smart object platforms.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47654789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An effective cloud-based smart home appliances automation in IoT using PHMM model 使用PHMM模型实现物联网中有效的基于云的智能家电自动化
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040789
M. Sundarakumar, S. Sankar, S. Reddy
{"title":"An effective cloud-based smart home appliances automation in IoT using PHMM model","authors":"M. Sundarakumar, S. Sankar, S. Reddy","doi":"10.1504/ijitst.2021.10040789","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040789","url":null,"abstract":"Internet of things (IoT) is an emerging and innovative approach to control the home appliances remotely. A trillion of devices are connected to the internet that are controlled and monitored in real-world applications. The main goal is to provide the automation for home appliances using IoT. Wireless sensor networks (WSNs)-based home automation systems are very difficult to manage with the devices using a centralised approach due to the mobility. To solve this issue, wireless home automation system (WHAS) is proposed, which uses the predictive hidden Markov model (PHMM) to control the devices efficiently and conserves the energy utilisation among the devices. The status of the devices are monitored continuously and selecting the device operation either in manual mode or automatic mode using the PHMM model. The proposed approach conserves more energy than traditional methods.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49332176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信