applsci-logo

Journal Browser

Journal Browser

Future Security of NFT-Blockchain

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 September 2024) | Viewed by 2163

Special Issue Editor

Division of Computer Engineering & Science, Sunmoon University, Asan-City 31460, Republic of Korea
Interests: cyber-security; smart-city; human relationships; relational contexts; meta-analysis
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A core function of cyber-security is to protect connected devices, such as IoT devices, and the services we access, both online and at work. In threat analyses of cyber-security, in which researchers summarize the various sources of threats, the results could appear biased without the use of objective methodology. To solve this bias problem, we use meta-analysis. Once the statistical results are combined with the meta-analysis, their statistical power and precision are increased because the sample size is significantly larger compared to those of individual studies. Meta-analysis is used in various fields, such as economics, sociology, psychology, education, and medicine, to statistically integrate and analyze the quantitative effect size results of different studies. Recently, analyses of the technology transfer performance of public research institutes and technology commercialization promotion, performance enhancement analysis, and educational research methods have been used.

With modern society becoming more complex and diversified, more social issues will arise in the digital age. Therefore, this Special Issue aims to publish research papers on meta-analyses for future applications. We welcome contributions on, but not limited to, the following topics:

  • Meta-analysis of learning for cyber-security
  • Meta-analysis of digital side-effects in cyber-security
  • Meta-analysis of semantic networks in cyber-security
  • Generative AI in security monitoring
  • Analysis of future security in generative AI
  • Cyber-security for NFTs
  • AR/VR/XR/Metaverse security
  • NFT-Blockchain applications
  • Secure communication in blockchains
  • Fake news and deep fake detection

Dr. Hoon Ko
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • meta-analysis of learning for cyber-security
  • meta-analysis of digital side-effects in cyber-security
  • meta-analysis of semantic networks in cyber-security
  • generative AI in security monitoring
  • analysis of future security in generative AI
  • cyber-security for NFTs
  • AR/VR/XR/Metaverse security
  • NFT-blockchain applications
  • secure communication in blockchains
  • fake news and deep fake detection

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 3958 KiB  
Article
PHR-NFT: Decentralized Blockchain Framework with Hyperledger and NFTs for Secure and Transparent Patient Health Records
by Huwida E. Said, Nedaa B. Al Barghuthi, Sulafa M. Badi, Faiza Hashim and Shini Girija
Appl. Sci. 2024, 14(22), 10744; https://doi.org/10.3390/app142210744 - 20 Nov 2024
Viewed by 333
Abstract
Blockchain technology holds significant promise for healthcare by enhancing the security and integrity of patient health records (PHRs) through decentralized storage and transparent access. However, it has substantial limitations, including problems with scalability, high transaction costs, privacy concerns, and intricate stakeholder access management. [...] Read more.
Blockchain technology holds significant promise for healthcare by enhancing the security and integrity of patient health records (PHRs) through decentralized storage and transparent access. However, it has substantial limitations, including problems with scalability, high transaction costs, privacy concerns, and intricate stakeholder access management. This study presents PHR-NFT, a novel framework that strengthens PHR privacy by utilizing Hyperledger Fabric and non-fungible tokens (NFTs) to address these issues. PHR-NFT improves privacy and communication by letting patients keep control of their medical records while permitting temporary, permission-based access by medical professionals. PHR-NFT offers a transparent solution that increases trust among healthcare stakeholders through the robust and decentralized architecture of the Hyperledger Fabric. This study demonstrates the viability and effectiveness of the PHR-NFT framework through performance evaluations focused on transaction latency, throughput, and security. This research has valuable implications for enhancing data privacy and security in healthcare practices and insightful information about blockchain-based healthcare systems. Full article
(This article belongs to the Special Issue Future Security of NFT-Blockchain)
Show Figures

Figure 1

18 pages, 2786 KiB  
Article
Digital Content Management Using Non-Fungible Tokens and the Interplanetary File System
by Hoon Ko, Juhee Oh and Sung Uk Kim
Appl. Sci. 2024, 14(1), 315; https://doi.org/10.3390/app14010315 - 29 Dec 2023
Cited by 1 | Viewed by 1122
Abstract
Non-fungible tokens (NFTs) are digital identifiers containing metadata, such as token number, title, content, and image URL, and are linked to digital assets, which are characterized by the fact that, unlike conventional virtual assets, they have their own unique value and cannot be [...] Read more.
Non-fungible tokens (NFTs) are digital identifiers containing metadata, such as token number, title, content, and image URL, and are linked to digital assets, which are characterized by the fact that, unlike conventional virtual assets, they have their own unique value and cannot be replaced. NFTs cannot be deleted or forged; therefore, they can be used to authenticate the ownership of digital assets. The metadata of the NFTs are uploaded to the interplanetary file system (IPFS), which is a distributed file system, and converted into unique content identifiers (CIDs) that are stored on the blockchain. Digital content (DC) is divided into multiple pieces; it also has its own unique value and is distributed and stored using the IPFS. This study built an NFT-based IPFS testbed and experimented with the process of generating unique values for DC divided into three groups and sharing them. The results confirmed that each DC had a unique hash value and no duplicates existed. Full article
(This article belongs to the Special Issue Future Security of NFT-Blockchain)
Show Figures

Figure 1

Back to TopTop