2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-Based 2022
DOI: 10.1109/niss55057.2022.10085236
|View full text |Cite
|
Sign up to set email alerts
|

Public-Key Cryptography behind Blockchain Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…-Data encryption and decryption using secure algorithms like AES, RSA, or ECC (Elliptic Curve Cryptography) [3,111]; -Digital signature verification using algorithms like ECDSA or RSA to ensure data integrity and authenticity [58]; -Access control and authorization mechanisms, such as OAuth 2.0, JWT, or custom authentication protocols [96]; -Firewalls, intrusion detection/prevention systems, and other security appliances for protecting the nodes themselves [74].…”
Section: They Can Implement Various Security Controls Such Asmentioning
confidence: 99%
“…-Data encryption and decryption using secure algorithms like AES, RSA, or ECC (Elliptic Curve Cryptography) [3,111]; -Digital signature verification using algorithms like ECDSA or RSA to ensure data integrity and authenticity [58]; -Access control and authorization mechanisms, such as OAuth 2.0, JWT, or custom authentication protocols [96]; -Firewalls, intrusion detection/prevention systems, and other security appliances for protecting the nodes themselves [74].…”
Section: They Can Implement Various Security Controls Such Asmentioning
confidence: 99%