[1] Barenji A.V., Zhang Y., and Bhavsingh M., 2023. A blockchain-based framework for enhancing privacy and security in online transactions. Int. J. Comput. Eng. Res. Trends,10(11), pp. 1-9. [2] Alsubai S., Alqahtani A., Garg H., Sha M., and Gumaei A., 2024. A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records. Complex & Intelligent Systems,10(5), pp. 6117-6141. [3] Anbarkhan S.H.,2024. Securing IoT networks: A post-quantum blockchain and deep learning approach for enhanced cyber defense. International Journal of Safety & Security Engineering,14(6). [4] Zhang E., Geng C., Li C., and Chen S., 2024. Dynamic learnable logit adjustment for long-tailed visual recognition. IEEE Transactions on Circuits and Systems for Video Technology,34(9), pp. 7986-7997. [5] Kakarlapudi P.V., and Mahmoud Q.H., 2021. Design and development of a blockchain-based system for private data management.Electronics, 10(24), 3131. [6] Kavitha S., Srinivasan J., Ramachandran P., and Nasurulla I., 2024. Enhanced cryptographic performance and security using optimized edward-elgamal signature scheme for IoT and blockchain applications. International Journal on Smart Sensing and Intelligent Systems, (1). [7] Khan B.U.I., Goh K.W., Khan A.R., Zuhairi M.F., and Chaimanee M., 2024. Integrating AI and blockchain for enhanced data security in IoT-driven smart cities. Processes,12(9). [8] Ottakath N., Al-Ali A., Al-Maadeed S., Elharrouss O., and Mohamed A., 2023. Enhanced computer vision applications with blockchain: A review of applications and opportunities.Journal of King Saud University-Computer and Information Sciences, 35(10), 101801. [9] Kuznetsov O., Rusnak A., Yezhov A., Kanonik D., Kuznetsova K., and Karashchuk S., 2024. Enhanced security and efficiency in blockchain with aggregated zero-knowledge proof mechanisms.IEEE Access, 12, pp. 49228-49248. [10] Kallapu B., Dodmane R., Thota S., and Sahu A.K., 2023. Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption.Electronics, 12(18), 3890. [11] Sharma A., Upadhyay D., and Sharma S., 2024. Enhancing blockchain security: a novel approach to integrated malware defence mechanisms.Engineering Research Express, 6(2), 025215. [12] Albshaier L., Almarri S., and Albuali A., 2025. Federated learning for cloud and edge security: A systematic review of challenges and AI opportunities.Electronics, 14(5), 1019. [13] Abdulzahra A.W.,2025. Integrative blockchain frameworks for achieving enhanced data security and trust in infrastructure management systems. International Journal of Engineering and Technology Research & Development,6(1), pp. 1-6. [14] Commey D., and Crosby G.V., 2025. PQS-BFL: A post-quantum secure blockchain-based federated learning framework.Arxiv Preprint Arxiv:2505.01866. [15] Dunesh Madhav B., Teja Sai Vijaya babu, A., Naga Sai Anil Chowdary, A., Victo Sudha George G., and Jayaprakash J., 2024. A secured data sharing using proxy re-encryption and blockchain in cloud storage. InInternational Conference on Cognitive Computing and Cyber Physical Systems, pp. 31-49. [16] Hanif M., Munir E.U., Rehan M.M., Ahmad S.G., Khan I., and Setchi R., 2025. Tiered blockchain framework: A secure, trustworthy, and cost-efficient solution for the digital rights protection.Blockchain: Research and Applications, 100308. [17] Sola-Thomas E., and Imtiaz M.H., 2025. Development of a quantum-resistant file transfer system with blockchain audit trail.Arxiv Preprint Arxiv:2504.07938. [18] Tawfik A.M., Al-Ahwal A., Eldien A.S.T., and Zayed H.H., 2025. ACHealthChain blockchain framework for access control and privacy preservation in healthcare.Scientific Reports, 15(1), 16696. [19] Zilong D., Alobaedy M.M., Hafiz M.N., Ibrahim B., and Huang X., 2024. A blockchain technology framework to enhance security and interoperability of electronic healthcare records. [20] Guo H., Li W., Nejad M., and Shen C.C., 2022. A hybrid blockchain-edge architecture for electronic health record management with attribute-based cryptographic mechanisms. IEEE Transactions on Network and Service Management,20(2), pp. 1759-1774. [21] Hamilton M.J., Banáth J.P., Lam V., LePard N.E., Krystal G., and Bennewith K.L., 2012. Serum inhibits the immunosuppressive function of myeloid-derived suppressor cells isolated from 4T1 tumor-bearing mice. Cancer Immunology, Immunotherapy,61(5), pp. 643-654. [22] Xu S., Wang Z., Wang L., Zhang S., Shao W., and Wang Q., 2024. A sharding scheme based on graph partitioning algorithm for public blockchain. Computer Modeling in Engineering & Sciences (CMES),139(3). [23] Zhang Y., Tang Y., Li C., Zhang H., and Ahmad H., 2024. Post-quantum secure identity-based signature scheme with lattice assumption for internet of things networks.Sensors, 24(13), 4188. [24] Dhar S., Khare A., Dwivedi A.D., and Singh R., 2024. Securing IoT devices: A novel approach using blockchain and quantum cryptography.Internet of Things, 25, 101019. |