As part of the infamous Contagious Interview campaign, North Korean threat actors were seen abusing legitimate Microsoft ...
Abstract: This paper introduces a microservice-based architecture to revolutionize how official documents are shared, verified, and stored in digital formats. Addressing the pressing issues of privacy ...
Abstract: Innovative E-Voting mechanism designed to strengthen the integrity and security of electoral processes through the combination of Blockchain and the Internet of Things (IoT). Leveraging the ...