2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) 2019
DOI: 10.1109/icicict46008.2019.8993229
|View full text |Cite
|
Sign up to set email alerts
|

Security vulnerabilities in Information communication technology: Blockchain to the rescue (A survey on Blockchain Technology)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
See 3 more Smart Citations
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
“…The security of data shared and stored in the network due to immutability of DLTs makes them invaluable to many industries including SC. Furthermore, Sharma et al [43] explains consensus mechanism as the decision making process which promotes and ensures fairness and equal opportunities in distributed networks whilst Saini et al [44] describes it as integrity maintaining algorithm. Shahaab et al [3] debate that it is difficult to achieve consensus in distributed systems as the protocols must be resilient to failure, network partitions, message delays, ordering and corruption.…”
Section: A Cyber Resiliencementioning
confidence: 99%
See 2 more Smart Citations
“…Different sectors such as governments, healthcare, agriculture, manufacturing, and supply chain have developed and tested the blockchain models. Blockchain technology is known as a technology that runs cryptocurrency; it is a public ledger system, which maintains the integrity of data (Saini et al 2019). According to Yli-Huumo et al (2016:5), blockchain technology was first introduced as the application platform that supports Bitcoin cryptocurrency.…”
Section: Overview Of Blockchain Technologymentioning
confidence: 99%