Avoiding Counterfeits and Achieving Privacy in Supply Chain: A Blockchain Based Approach
By Prem Baranwal -July 2021
Counterfeiting is one of the biggest threats to the current RFID-based supply chain industry. There are
Read MoreSecuring Cloud Native Applications Using Blockchain
By Pankaj Mendki -July 2021
Cloud computing technologies have been dominating fields for more than a decade now. Wider adoption of cloud
Read MoreEvaluating Webassembly Enabled Serverless Approach for Edge Computing
By Pankaj Mendki -December 2020
The edge computing ecosystem has been evolving in the last few years. There have been different architectural
Read MoreBlockchain Based Full Privacy Preserving Public Procurement
By Prem Baranwal -September 2020
Public procurement is one of the government activities more prone to corruption, and e-procurement systems have
Read MoreLegally Binding Anonymous Multiparty Commitments on a Blockchain
By Debasish Chawdhuri -August 2020
In recent times, many blockchain solutions have been proposed for automatic electronic contracts on a blockchain. The
Read MoreA Fair and Anonymous Payment System for the Onion Relays
By Debasish Chawdhuri -July 2020
Tor, aka ‘The Onion Router’, is a protocol that allows anonymous browsing of the web in the
Read MoreBlockchain Enabled IoT Edge Computing: Addressing Privacy, Security and other Challenges
By Pankaj Mendki -June 2020
We discussed Blockchain-enabled IoT edge computing in the earlier publication of this series, which allows any
Read MoreAcceptable Privacy for XAND Blockchain
By Debasish Chawdhuri -October 2019
Recently, the privacy of blockchain transactions has taken center stage. Privacy is an essential feature of crypto
Read MorePatient Privacy and Ownership of Electronic Health Records on a Blockchain
By Debasish Chawdhuri -July 2019
Blockchain technology has found application outside of cryptocurrency in recent times. The development of patient-centric storage
Read More