DC FieldValueLanguage
dc.contributor.authorKnežević, Milicaen_US
dc.date.accessioned2022-12-06T17:52:42Z-
dc.date.available2022-12-06T17:52:42Z-
dc.date.issued2022-
dc.identifier.urihttp://researchrepository.mi.sanu.ac.rs/handle/123456789/4910-
dc.description.abstractOver the years, blockchain surpassed the initial application solely related to cryptocurrencies and finance, and it is seen today as a general - purpose technology that can be used in many other use - cases. The key enabler for blockchain widespread usage is the concept of smart contracts, which brought the programmability potential into blockchains. One of the fruitful research directions on blockchain applications is in the subject area of authentication, authorization and access control, where the blockchain technology is used, on the one hand, to fortify the security and, on the other hand, to overcome the need for a central authority. However, when designing blockchain-based systems, we have to carefully take into consideration inherent characteristics and limitations of blockchains. On the example of a recently published authentication protocol for wireless medical sensor networks, we will show how inappropriate employment of the blockchain technology can undermine the system and can cause multiple vulnerabilities of the protocol.en_US
dc.publisherMathematical Institute of the Sebian Academy of Sciences and Artsen_US
dc.titleSecurity evaluation of certain blockchain-based systems – An illustrative exampleen_US
dc.typeConference Paperen_US
dc.relation.conferenceIndia-Serbia Workshop on Selected Topics of Artificial Intelligence and Information Technology Techniques and Applications, Belgrade, Serbia, 13-15 June 2022.en_US
dc.relation.publicationBook of Abstractsen_US
dc.identifier.urlhttps://miteam.mi.sanu.ac.rs/asset/LaLDoCdK4jHoNDMrq-
dc.contributor.affiliationComputer Scienceen_US
dc.contributor.affiliationMathematical Institute of the Serbian Academy of Sciences and Arts-
dc.description.rankM32-
item.cerifentitytypePublications-
item.openairetypeConference Paper-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextNo Fulltext-
crisitem.author.orcid0000-0002-8082-2762-
Show simple item record

Page view(s)

56
checked on May 9, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.