
-
Ransomware as a Service using Smart Contracts and IPFS
Decentralized systems, such as distributed ledgers and the InterPlanetar...
read it
-
OAuth 2.0 authorization using blockchain-based tokens
OAuth 2.0 is the industry-standard protocol for authorization. It facili...
read it
-
Exploiting Satellite Broadcast despite HTTPS
HTTPS enhances end-user privacy and is often preferred or enforced by ov...
read it
-
Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains
In this work, we leverage advances in decentralized identifiers and perm...
read it
-
Secure IoT access at scale using blockchains and smart contracts
Blockchains and smart contracts are an emerging, promising technology, t...
read it
-
Interledger Smart Contracts for Decentralized Authorization to Constrained Things
We present models that utilize smart contracts and interledger mechanism...
read it
-
OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments
We present models for utilizing blockchain and smart contract technology...
read it
-
Smart contracts for the Internet of Things: opportunities and challenges
With the Internet of Things (IoT), Things are expected to live in differ...
read it
-
Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies
Despite technological advances, most smart objects in the Internet of Th...
read it
-
ICN enabling CoAP Extensions for IP based IoT devices
The Constrained Application Protocol (CoAP) and its extensions, such as ...
read it