A Study on Non-Fungible Tokens Marketplace for Secure Management
The secure management and sale of digital assets has become a critical problem in an increasingly digitized environment. This project intends to address this issue by creating decentralized applications (dApps) that use blockchain technology to provide secure and efficient digital asset management,...
| Main Authors: | Rishabh, Singh, Chitra, K., Yap, Choi Sen |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1950/ http://eprints.intimal.edu.my/1950/2/493 http://eprints.intimal.edu.my/1950/3/ij2024_18r.pdf |
Similar Items
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023)
by: Woo, Jan Yin
Published: (2023)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Non-Fungible Tokens (NFTs) in Islamic perspective: challenges and way forward
by: Azlin Alisa Ahmad,
Published: (2024)
by: Azlin Alisa Ahmad,
Published: (2024)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
E-Learning App Using Image Processing, Detection, Ranking, and Progress Monitoring for Preschoolers
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
SOS Smart Reminder and Emergency Detection Device Using ESP8266 and MPU6050
by: Deepashree, H.S., et al.
Published: (2024)
by: Deepashree, H.S., et al.
Published: (2024)
Blockchain-based Management for Organ Donation and Transplantation
by: Harish, V., et al.
Published: (2024)
by: Harish, V., et al.
Published: (2024)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
E-Real Estate Management System / Sandeep Singh Mukhtiar Singh
by: Sandeep Singh, Mukhtiar Singh
Published: (2004)
by: Sandeep Singh, Mukhtiar Singh
Published: (2004)
Monitoring Unusual Activity Using Remote-Controlled Computer and Android Based Application
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Smart Lighting System for Library Using IoT Technology
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
School teacher-subject allocation management system
by: Yap, Dennis Jian Yuan
Published: (2024)
by: Yap, Dennis Jian Yuan
Published: (2024)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Web services for e-Procurement system in the context of supply chain management / Yap Khay Seng
by: Yap, Khay Seng
Published: (2007)
by: Yap, Khay Seng
Published: (2007)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Web based agent for transaction of mercantile-security measures / Yan Wee Jing
by: Yan , Wee Jing
Published: (2001)
by: Yan , Wee Jing
Published: (2001)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Similar Items
-
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024) -
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023) -
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004) -
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020) -
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)