Jawad, MuwafaqYassin, Ali A.Al,-Asadi, Hamid Ali AbedAbduljabbar, Zaid AmeenNyangaresi, Vincent OmolloHussien, Zaid AlaaNeamah, Husam A.2025-04-292025-04-292025Jordanian Journal of Computers and Information Technology. -11 : 2 (2025), p. 238-259. -Jordanian J. Comput. Info. Technol. - 2415-1076. - 2413-93512413-93512415-1076https://hdl.handle.net/2437/389482Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacksfolyóiratcikkopen access articlehttps://ebib.lib.unideb.hu/ebib/CorvinaWeb?action=cclfind&resultview=long&ccltext=idno+BIBFORM129648Műszaki tudományokInformatikai tudományokhttps://doi.org/10.5455/jjcit.71-1736013097szerző2025-04-29