- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Access Control and Trust
- Advanced Authentication Protocols Security
- Cloud Computing and Resource Management
- Distributed systems and fault tolerance
- IPv6, Mobility, Handover, Networks, Security
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- FinTech, Crowdfunding, Digital Finance
- Security in Wireless Sensor Networks
- Privacy, Security, and Data Protection
- Chaos-based Image/Signal Encryption
- IoT and Edge/Fog Computing
- Peer-to-Peer Network Technologies
- Digital Rights Management and Security
- Service-Oriented Architecture and Web Services
- Banking stability, regulation, efficiency
- Cryptographic Implementations and Security
- Data Quality and Management
- Big Data and Business Intelligence
- User Authentication and Security Systems
- Advanced Data Storage Technologies
Massachusetts Institute of Technology
2013-2024
IIT@MIT
2016-2024
Film Independent
2024
Duke Kunshan University
2023
Human Computer Interaction (Switzerland)
2023
Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2022
Instituto Superior Técnico
2022
Google (United States)
2018
D-Wave Systems (Canada)
2008
UNSW Sydney
2006
There is considerable interest today in the use of blockchain technology to provide better visibility into shared information among a number participants and systems arranged decentralized peer-to-peer topology. Several challenges remain be addressed, including interoperability, survivability, manageability systems. Crucial answering these need understand aspects Internet architecture that has made it scalable, resilient, commercial success as global connectivity infrastructure. In this...
In this paper we describe a privacy-preserving method for commissioning an IoT device into cloud ecosystem. The consists of the proving its manufacturing provenance in anonymous fashion without reliance on trusted third party, and to be anonymously registered through use blockchain system. We introduce ChainAnchor architecture that provides fashion. goal is (i) support commissioning, (ii) device-owners being remunerated selling their sensor-data service providers, (iii) incentivize providers...
Entrepreneurs, enterprises, and governments are using distributed ledger technology (DLT) as a component of complex information systems, therefore interoperability capabilities required. Interoperating DLTs enable network effects synergies, similarly to the rise Internet, it unlocks full potential technology. However, due novelty area, mechanisms (IMs) still not well understood, is studied in silos. Consequently, choosing proper IM for use case challenging. Our article has three...
Web3 is the most hyped concept from 2020 to date, greatly motivating prosperity of Internet Value and Metaverse. However, no solid evidence stipulates exact definition, criterion, or standard in sense such a buzzword. To fill gap, we aim clarify term this work. We narrow down connotation by separating it high-level controversy argues and, instead, focusing on its protocol, architecture, evaluation perspective blockchain fields. Specifically, have identified all potential architectural design...
In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as dynamic, distributed setting which command and control nodes move along with individual users. scenario, data must be securely multicast from one source to many users, requiring that users properly keyed. Furthermore, because out session (due mobility, attrition, reinforcement), order preserve confidentiality, it becomes necessary rekey each time user enters or leaves. We...
This article aims to investigate solutions incorporated by a group called an Architecture Board in the global healthcare enterprises (GHE) for solving issues and mitigating related architecture risks while implementing “Adaptive Integrated EA framework,” which can be applied companies promoting IT strategy using Cloud/Mobile IT. The distribution of is mitigate from different categories across domains enterprise (EA) revealed, thereby covering applications, involving ERP, technologies...
Robot swarms exploiting Merkle trees achieve secret and secure cooperation in sequential missions.
In the current work we discuss notion of gateways as a means for interoperability across different blockchain systems. We two key principles design gateway nodes and scalable protocols, namely (i) opaque ledgers principle analogue autonomous systems in IP datagram routing, (ii) externalization value end-to-end Internet architecture. illustrate need standard protocol by describing unidirectional asset movement between peer gateways, under strict condition both blockchains being...
A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how currently deployed and used, likely paths of future development.
The rapid deployment of autonomous AI agents creates urgent challenges around authorization, accountability, and access control in digital spaces. New standards are needed to know whom act on behalf guide their use appropriately, protecting online spaces while unlocking the value task delegation agents. We introduce a novel framework for authenticated, authorized, auditable authority agents, where human users can securely delegate restrict permissions scope maintaining clear chains...
It is time for the legacy financial infrastructure to seamlessly connect with modern, decentralized infrastructure. Although it increasingly evident that finance (namely distributed ledgers) will coexist and complement infrastructure, also clear such interoperability efforts carry new risks concerns. In particular, managing range of heterogeneous (and not well-established) brings security, privacy, regulatory issues. The first step overcome some these challenges recognize in many deployment...
The advancements in the fields of IT and robotics are provoking fourth industrial revolution transforming our economy toward machine economy. Billions economically autonomous machines engaging business relationships raise novel requirements regarding security, privacy, regulation, models, trustful transaction processing, interoperability. A technology that promises to provide solutions these challenges is blockchain. Neither practice has spawned productive nor research been able assess...
Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research dedicated investigating development impact blockchain related technologies. As undertaken, most projects take specific homogenous perspective, such technical or business viewpoint. To...
Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges. On one hand, hacks on bridges led to monetary losses of around 3.1 billion USD, highlighting flaws security models governing interoperability mechanisms and ineffectiveness incident response frameworks. other users bridge operators experience restricted privacy, which broadens potential attack surface. In this paper, we present most comprehensive study date...
Robots have potential to revolutionize the way we interact with world around us. One of their largest potentials is in domain mobile health where they can be used facilitate clinical interventions. However, accomplish this, robots need access our private data order learn from these and improve interaction capabilities. Furthermore, enhance this learning process, knowledge sharing among multiple robot units natural step forward. date, there no well-established framework which allows for such...
We study the evolution of ideas related to creation asset-backed currencies over last 200 years and argue that recent developments distributed ledger technologies blockchains give a new lease life. propose practical mechanism combining novel technological breakthroughs with well-established hedging techniques for building an transactional oriented cryptocurrency, which we call digital trade coin (DTC). show in its mature state, DTC can serve as much-needed counterpoint fiat reserve today.
<p>Blockchain interoperability conflates the need for distributed systems to communicate with third- party without existence of a canonical chain or orchestration layer. As there is not “a rule them all” (due reasons such as performance, privacy, and market forces), these rely on exchanging data value across network boundaries. Interconnected achieve higher than sum their parts, similar how Internet emerged set isolated Local Area Networks (LANs) - and, by force surprising synergies,...