![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
KEP: Keystroke Evoked Potential for EEG-Based User Authentication
In recent years, the rapid proliferation of Brain-Computer Interface (BCI) applications has made the issue of security increasingly important. User authentication serves as the cornerstone of any secure BCI sy...
-
Chapter and Conference Paper
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation
In the research society, many solutions to solving blockchain scaling have been tried historically, usually by compromising on decentralisation. Ethereum has chosen to scale by switching to Proof of Stake (PoS...
-
Chapter and Conference Paper
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security
Public transportation not only has a high utilization rate but also has a high density of population on-board. Kee** these facilities safe-to-use and well-functioned is the highest priority since it is heavi...
-
Chapter and Conference Paper
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System
In recent years, with the fast development of autonomous driving technology, the Internet of Vehicles (IoV) has received much more attention regarding the security aspect. The traditional security defense stra...
-
Chapter and Conference Paper
Designing Enhanced Robust 6G Connection Strategy with Blockchain
With the rapid evolution of wireless communication technologies, the new generation of 6G is already under development, due to the next step-change in performance from Gigabit to Terabit capacities as well as ...
-
Chapter and Conference Paper
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks
Electronic Identity (eID) is a solution toward solving the identity problem when deploying e-Government. Such solution should not only be secure, but also have to be robust enough under adversarial conditions....
-
Article
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities
To improve the quality of mobility and transportation in a smart city, Electronic Toll Collection (ETC) system has been widely implemented along toll roads, which can automatically collect the usage fee from v...
-
Chapter and Conference Paper
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication
In the coming period of Internet of Things (IoT), user authentication is one important and essential security mechanism to protect assets from unauthorized access. Textual passwords are the most widely adopted...
-
Chapter and Conference Paper
Mind the Scraps: Attacking Blockchain Based on Selfdestruct
A smart contract is a program that resides its binary code and states in blockchain to provide contract-like functionality. The binary code is unchangeable once it is deployed into the chain. This can ensure t...
-
Chapter and Conference Paper
ActAnyware - Blockchain-Based Software Licensing Scheme
Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...
-
Chapter and Conference Paper
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm
The increasingly interconnected network results in the change of information flow between users and service providers, hence there is an emerging need for building a secure channel for connections. Currently, ...