Skip to main content

Showing 1–4 of 4 results for author: Shahraki, A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02544  [pdf, ps, other

    cs.CR

    A Novel Endorsement Protocol to Secure BFT-Based Consensus in Permissionless Blockchain

    Authors: Ziqiang Xu, Ahmad Salehi Shahraki, Naveen Chilamkurti

    Abstract: Permissionless blockchain technology offers numerous potential benefits for decentralised applications, such as security, transparency, and openness. BFT-based consensus mechanisms are widely adopted in the permissioned blockchain to meet the high scalability requirements of the network. Sybil attacks are one of the most potential threats when applying BFT-based consensus mechanisms in permissionl… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Accepted at IEEE Wireless Communications and Networking Conference (WCNC), 2024

  2. Privacy of Fitness Applications and Consent Management in Blockchain

    Authors: May Alhajri, Ahmad Salehi Shahraki, Carsten Rudolph

    Abstract: The rapid advances in fitness wearable devices are redefining privacy around interactions. Fitness wearables devices record a considerable amount of sensitive and private details about exercise, blood oxygen level, and heart rate. Privacy concerns have emerged about the interactions between an individual's raw fitness data and data analysis by the providers of fitness apps and wearable devices. Th… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

    Comments: This article has been accepted for publication in a future issue of Australasian Computer Science Week 2022 (ACSW 2022), but has not been fully edited Content may change prior to final publication. Citation information: DOI https://doi.org/10.1145/3511616.3513100, ACSW 2022

    Journal ref: In ACSW 2022, February 14 to 18, 2022, Brisbane, Australia. ACM, New York, NY, USA 9 Pages

  3. arXiv:2202.12582  [pdf

    cs.CR cs.CY cs.DC cs.LO eess.SY

    A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context

    Authors: May Alhajri, Carsten Rudolph, Ahmad Salehi Shahraki

    Abstract: Wearable fitness devices are widely used to track an individual's health and physical activities to improve the quality of health services. These devices sense a considerable amount of sensitive data processed by a centralized third party. While many researchers have thoroughly evaluated privacy issues surrounding wearable fitness trackers, no study has addressed privacy issues in trackers by givi… ▽ More

    Submitted 2 March, 2022; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: This article has been accepted for publication in a future issue of IEEE Access journal

  4. arXiv:2108.08471  [pdf

    cs.CR

    Decentralized Policy Information Points for Multi-Domain Environments

    Authors: M Ridwanur Rahman, Ahmad Salehi Shahraki, Carsten Rudolph

    Abstract: Access control models have been developed to control authorized access to sensitive resources. This control of access is important as there is now a need for collaborative resource sharing between multiple organizations over open environments like the internet. Although there are multiple access control models that are being widely used, these models are providing access control within a closed en… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.