-
1
-
2
Trust Mechanism Based Secure Cluster Head Election Algorithm for Electric Power Wireless Sensor Networks
Published 2023-08-01“…A trust mechanism based secure cluster head election algorithm is thus proposed for wireless sensor networks. …”
Get full text
Article -
3
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
Published 2025-06-01“… Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. …”
Get full text
Article -
4
-
5
-
6
-
7
Blockchain-Driven E-Voting: Enhancing Security and Integrity with Smart Contracts
Published 2025-06-01“…The transparency, immutability, and resistance to tampering provided by blockchain enhance the reliability and credibility of the voting process. …”
Get full text
Article -
8
Research on the Raft improved algorithm for anti-Byzantine nodes
Published 2025-03-01“…ObjectivesIn order to solve the problem of malicious election and log tampering caused by Byzantine nodes in original Raft algorithm, an AntiB-Raft (Anti-Byzantine Raft) algorithm was proposed to resist Byzantine nodes.MethodsWhen the candidate requested to replace the Leader, the heartbeat monitoring threshold mechanism was used to determine whether the candidate can successfully obtain enough votes to become the new Leader, which was agreed that only when more than half of the nodes detected that the current Leader was really down, the candidate can obtain more than half of the votes and become the new Leader, so as to prevent the Byzantine node from maliciously pulling votes when current Leader was not down, which would result in the replacement of the normal Leader. …”
Get full text
Article -
9
BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
Published 2024-04-01“…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
Get full text
Article -
10
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
Published 2025-06-01“…For example, software and hardware have become highly susceptible to various threats, like reverse engineering, cloning, tampering, and IP piracy. While various techniques exist to enhance software and hardware security, including encryption, native code, and secure server-side execution, obfuscation emerges as a preeminent and cost-efficient solution to address these challenges. …”
Get full text
Article