Zero‐trust‐based security model against data breaches in the banking sector: : A blockchain consensus algorithm
Abstract
Graphical Abstract
References
Recommendations
Decentralized trustworthiness score management with smart contracts on the trustlend platform
AbstractThe personal lending marketplace, known as Peer‐to‐Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable ...
The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. The prototype shows how end‐users can easily access loans with reduced collateral without hidden costs and swift ...
Market Price Effects of Data Security Breaches
This study examines the impact of reported breaches in computer security using event study analysis. We use the event-study methodology to measure the magnitude of the effect of data security breach events on the behavior of stock markets. Our data come ...
Cyber security framework for Internet of Things-based Energy Internet
AbstractWith the significant improvement in deployment of Internet of Things (IoT) into the smart grid infrastructure, the demand for cyber security is rapidly growing. The Energy Internet (EI) also known as the integrated internet-based smart grid and ...
Highlights- The security and privacy of components, data and events in the Energy Internet.
- The framework relies on an identity-based security mechanism.
- A secure communication protocol that provides secure data exchange.
- An Intelligent ...
Comments
Information & Contributors
Information
Published In
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in