Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

Exploiting Vulnerabilities in Weak CAPTCHA Mechanisms within DVWA
Volume-7 | Issue-2

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Gamification in Mobile Apps: Assessing the Effects on Customer Engagement and Loyalty in the Retail Industry
Volume-5 | Issue-4

Investigating Process Scheduling Techniques for Optimal Performance and Energy Efficiency in Operating Systems
Volume-6 | Issue-4

Survey: Unconventional Categories of Chatbots that make use of Machine Learning Techniques
Volume-5 | Issue-3

Review on Sanskrit Sandhi Splitting using Deep Learning Techniques
Volume-6 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

Getis-Ord (Gi*) based Farmer Suicide Hotspot Detection
Volume-4 | Issue-2

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-1 / Issue-2 / Article-1

Volume - 1 | Issue - 2 | december 2019

EFFICIENT SECURITY AND PRIVACY MECHANISM FOR BLOCK CHAIN APPLICATION
Pages: 58-67
DOI
10.36548/jitdw.2019.2.001
Published
December, 2019
Abstract

The block chain has become one of the predominant term in the applications like financial, automobile, health care, risk management, and internet of things due to its reliability and more beneficial services. It executes every transaction by establishing trust in the open environment. The deployment of the block chain technology in the various applications remains as the recent research topic as the privacy and the security of the bock chain are undecided and unconvinced, so the paper tries to develop an efficient security and privacy mechanism for the block chain applications. The proposed method puts forth the biometric recognition in the block chain technology to improve the security and the privacy mechanism for the block chain application.

Keywords

Block Chain Challenges Privacy Security cryptographic techniques

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here