The Decentralized Non-Fungible Token Exchange with Secure Connections
During the COVID-19 outbreak, due to the lockdown, all museums and galleries were closed for more than a year. So, the buying and selling of physical arts have dropped. This project aims to overcome this challenge by developing a decentralized application called Decentralized NFT Exchange....
| Main Authors: | Sharath, M.S., Shreedhara N, Hegde, Lai, Mei Yoon |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1957/ http://eprints.intimal.edu.my/1957/2/500 http://eprints.intimal.edu.my/1957/3/joit2024_04b.pdf |
Similar Items
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024)
by: Rishabh, Singh, et al.
Published: (2024)
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023)
by: Woo, Jan Yin
Published: (2023)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Non-Fungible Tokens (NFTs) in Islamic perspective: challenges and way forward
by: Azlin Alisa Ahmad,
Published: (2024)
by: Azlin Alisa Ahmad,
Published: (2024)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Prediction of Fetal Health Status Using Machine Learning
by: Naidile S, Saragodu, et al.
Published: (2024)
by: Naidile S, Saragodu, et al.
Published: (2024)
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024)
by: Durgadevi, ., et al.
Published: (2024)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
The Crop Price Prediction Using Machine Learning: Preliminary Stage
by: Ramya, T.K., et al.
Published: (2024)
by: Ramya, T.K., et al.
Published: (2024)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023)
by: Gan, Hing Long
Published: (2023)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
Hybrid Neural Network and Decision Tree for for Exchange Rates Forecasting
by: Ardiansyah, Soleh, et al.
Published: (2012)
by: Ardiansyah, Soleh, et al.
Published: (2012)
A key-predistribution-based weakly connected dominating set for secure clustering in DSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
A study of database connection pool in microservice architecture
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
The Emergence of Internet of Things (IoT): Connecting Anything, Anywhere
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Foreign Exchange Forecasting by using Artificial Neural Networks: A Survey of Literature
by: Ardiansyah, Soleh, et al.
Published: (2012)
by: Ardiansyah, Soleh, et al.
Published: (2012)
Similar Items
-
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024) -
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023) -
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024) -
Non-Fungible Tokens (NFTs) in Islamic perspective: challenges and way forward
by: Azlin Alisa Ahmad,
Published: (2024) -
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)