{"id":"https://openalex.org/W4220761702","doi":"https://doi.org/10.23919/icact53585.2022.9728943","title":"Secured Land Title Transfer System in Australia using VPN based Blockchain Network","display_name":"Secured Land Title Transfer System in Australia using VPN based Blockchain Network","publication_year":2022,"publication_date":"2022-02-13","ids":{"openalex":"https://openalex.org/W4220761702","doi":"https://doi.org/10.23919/icact53585.2022.9728943"},"language":"en","primary_location":{"id":"doi:10.23919/icact53585.2022.9728943","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728943","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000066491","display_name":"Mohamad Arsalan Sheikh","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohamad Arsalan Sheikh","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Australia","School of Computer Science, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113985522","display_name":"Faryal Khattak","orcid":null},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Faryal Khattak","raw_affiliation_strings":["Griffith University,Department of Business Strategy and Innovation,Australia","Department of Business Strategy and Innovation, Griffith University, Australia"],"affiliations":[{"raw_affiliation_string":"Griffith University,Department of Business Strategy and Innovation,Australia","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"Department of Business Strategy and Innovation, Griffith University, Australia","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114910175","display_name":"Gul Zameen Khan","orcid":"https://orcid.org/0000-0003-4081-2268"},"institutions":[{"id":"https://openalex.org/I4210146984","display_name":"Dynamic Digital Depth (Australia)","ror":"https://ror.org/050fr6z67","country_code":"AU","type":"company","lineage":["https://openalex.org/I4210146984"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gul Zameen Khan","raw_affiliation_strings":["NLT Digital Solutions,Australia","NLT Digital Solutions, Australia"],"affiliations":[{"raw_affiliation_string":"NLT Digital Solutions,Australia","institution_ids":["https://openalex.org/I4210146984"]},{"raw_affiliation_string":"NLT Digital Solutions, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041615708","display_name":"Farookh Khadeer Hussain","orcid":"https://orcid.org/0000-0003-1513-8072"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Farookh Khadeer Hussain","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Australia","School of Computer Science, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000066491"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.1455,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.33425174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.932033121585846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6622800230979919},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5643522143363953},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.5486661791801453},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5407090783119202},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5243954062461853},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5214245319366455},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.0753067135810852}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.932033121585846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6622800230979919},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5643522143363953},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.5486661791801453},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5407090783119202},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5243954062461853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5214245319366455},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0753067135810852},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact53585.2022.9728943","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728943","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2065164788","https://openalex.org/W2181644121","https://openalex.org/W2531564265","https://openalex.org/W2611050176","https://openalex.org/W2794304098","https://openalex.org/W2904465401","https://openalex.org/W2983928178","https://openalex.org/W3089656219","https://openalex.org/W3120970772","https://openalex.org/W4214949812","https://openalex.org/W4290473017","https://openalex.org/W6603433933","https://openalex.org/W6770091494","https://openalex.org/W6801648163"],"related_works":["https://openalex.org/W3004627947","https://openalex.org/W3005560537","https://openalex.org/W2899742646","https://openalex.org/W3183834777","https://openalex.org/W3025041939","https://openalex.org/W3141861652","https://openalex.org/W2943858051","https://openalex.org/W4285128850","https://openalex.org/W2948753392","https://openalex.org/W2886237529"],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2],"evolved":[3],"as":[4],"a":[5,29,119],"secure":[6],"method":[7],"for":[8,77],"storing":[9],"important":[10,23],"private":[11],"and":[12,51,91],"public":[13,24],"record":[14],"transactions.":[15],"Transfer":[16],"of":[17,37,54,118],"land":[18],"title":[19],"is":[20,32,59,89],"one":[21],"such":[22],"record.":[25],"To":[26],"this":[27,44,94],"end,":[28],"blockchain-based":[30,113],"system":[31],"proposed":[33,90,106],"in":[34,43,93,115],"the":[35,49,55,69,74,78,98,105,111,116],"context":[36],"NSW":[38],"(New":[39],"South":[40],"Wales)":[41],"Australia":[42],"paper.":[45],"However,":[46],"due":[47],"to":[48,61,96],"decentralized":[50],"distributed":[52],"nature":[53],"blockchain":[56,79,87,108],"network,":[57],"it":[58],"prone":[60],"several":[62],"security":[63],"attacks.":[64,100],"We":[65],"have":[66],"focused":[67],"on":[68,73],"routing":[70,99,120],"attacks,":[71],"particularly":[72],"delay":[75],"attacks":[76],"network.":[80],"A":[81],"VPN":[82],"(Virtual":[83],"Private":[84],"Network)":[85],"based":[86],"network":[88,109,114],"implemented":[92],"paper":[95],"mitigate":[97],"The":[101],"results":[102],"show":[103],"that":[104],"VPN-based":[107],"outperforms":[110],"traditional":[112],"presence":[117],"attack.":[121]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
