Realizing credible remote agricultural auditing with trusted video technology

The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance....

Full description

Saved in:
Bibliographic Details
Published inJournal of cybersecurity (Oxford) Vol. 9; no. 1
Main Authors Mahmud, Redowan, Scarsbrook, Joshua D, Ko, Ryan K L, Jarkas, Omar, Hall, Josh, Smith, Stuart, Marshall, Jonathan
Format Journal Article
LanguageEnglish
Published Oxford Oxford University Press 2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance. Its digital transformation, known as remote auditing, could address these limitations to a greater extent; however, it is still subject to diverse cyberattacks, including tampering with the video streams provided for verification. Since a detailed and concurrent forensic examination of videos during remote auditing significantly increases the computational burden on the network and infrastructure, alternative or complementary solutions should be developed. This paper outlines the technical feasibility of applying digital signatures over live video streams as a way to authenticate the source during remote auditing and thus contributes to limiting the scope of potential cyber threats. It proposes design options for realizing the authentication process with trusted computing technologies at different phases, from signing the videos to transmitting them through unreliable networks. A reference prototype is also developed based on the proposed end-to-end design to quantify the performance of trusted remote agricultural auditing in terms of the frame signing time, attack resistance, and resource overhead.
AbstractList The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance. Its digital transformation, known as remote auditing, could address these limitations to a greater extent; however, it is still subject to diverse cyberattacks, including tampering with the video streams provided for verification. Since a detailed and concurrent forensic examination of videos during remote auditing significantly increases the computational burden on the network and infrastructure, alternative or complementary solutions should be developed. This paper outlines the technical feasibility of applying digital signatures over live video streams as a way to authenticate the source during remote auditing and thus contributes to limiting the scope of potential cyber threats. It proposes design options for realizing the authentication process with trusted computing technologies at different phases, from signing the videos to transmitting them through unreliable networks. A reference prototype is also developed based on the proposed end-to-end design to quantify the performance of trusted remote agricultural auditing in terms of the frame signing time, attack resistance, and resource overhead.
Author Smith, Stuart
Marshall, Jonathan
Scarsbrook, Joshua D
Hall, Josh
Mahmud, Redowan
Jarkas, Omar
Ko, Ryan K L
Author_xml – sequence: 1
  givenname: Redowan
  orcidid: 0000-0003-0785-0457
  surname: Mahmud
  fullname: Mahmud, Redowan
  email: md.redowan.mahmud@gmail.com
– sequence: 2
  givenname: Joshua D
  surname: Scarsbrook
  fullname: Scarsbrook, Joshua D
– sequence: 3
  givenname: Ryan K L
  surname: Ko
  fullname: Ko, Ryan K L
– sequence: 4
  givenname: Omar
  surname: Jarkas
  fullname: Jarkas, Omar
– sequence: 5
  givenname: Josh
  surname: Hall
  fullname: Hall, Josh
– sequence: 6
  givenname: Stuart
  surname: Smith
  fullname: Smith, Stuart
– sequence: 7
  givenname: Jonathan
  surname: Marshall
  fullname: Marshall, Jonathan
BookMark eNqFkM1LwzAYh4NMcM5dPRc8eeiWpE2aHmX4BRNB9FzyuWV0TU1Spf71dnR4EMTT-4P3ed4Xfudg0rhGA3CJ4ALBMlvKXgQtl7HnCiJ8AqYYkiLFw2rykxk5A_MQdhBCVGKcF3QKnl40r-2XbTaJ9FpZUevE672LOuEbb2VXx87zOuGdsvFAfdq4TaLvQtQq-bBKuyRquW1c7Tb9BTg1vA56fpwz8HZ3-7p6SNfP94-rm3Uqc8hiipnJMTSCailLJRhnJTUwM4wUSkhsqOCaZIgzwRTkVAgJS0lzzAiSRBCTzcDVeLf17r3TIVY71_lmeFlliLKCZiRHA5WPlPQuBK9NJW3k0bomem7rCsHq0F01dlcduxu0xS-t9XbPff-3cD0Krmv_Y78B32aG8g
CitedBy_id crossref_primary_10_1016_j_foodcont_2024_110460
crossref_primary_10_1016_j_jfp_2023_100196
Cites_doi 10.1109/MCE.2021.3062564
10.1016/j.compeleceng.2022.108267
10.1016/j.envsci.2021.12.021
10.1038/s43017-020-00122-y
10.1093/cybsec/tyab025
10.1007/s10462-020-09877-8
10.51599/are.2021.07.01.09
10.1016/j.infsof.2014.11.005
10.1109/IMCEC51613.2021.9482064
10.1016/j.erss.2021.102225
10.1016/j.compag.2021.106573
10.1093/cybsec/tyab006
10.1016/j.jss.2019.04.050
10.1109/MNET.2018.1700172
10.1109/TDSC.2022.3143493
10.1093/cybsec/tyac004
10.1109/ISC2.2018.8656668
10.1109/ACCESS.2019.2913682
10.1093/cybsec/tyab019
ContentType Journal Article
Copyright The Author(s) 2023. Published by Oxford University Press. 2023
The Author(s) 2023. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2023. Published by Oxford University Press. 2023
– notice: The Author(s) 2023. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID TOX
AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
COVID
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.1093/cybsec/tyad012
DatabaseName Oxford Journals Open Access Collection (WRLC)
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One
Coronavirus Research Database
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database (ProQuest)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database (ProQuest)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
Coronavirus Research Database
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: TOX
  name: Oxford Journals Open Access Collection
  url: https://academic.oup.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2057-2093
ExternalDocumentID 10_1093_cybsec_tyad012
10.1093/cybsec/tyad012
GroupedDBID 0R~
5VS
AAFWJ
AAMVS
AAOGV
AAPPN
AAPXW
AAVAP
ABEJV
ABPTD
ABQLI
ABXVV
ACGFS
ADBBV
AENZO
AFPKN
AFULF
ALMA_UNASSIGNED_HOLDINGS
ALUQC
ARCSS
AVWKF
BAYMD
BCNDV
BTTYL
CIDKT
EBS
EJD
GROUPED_DOAJ
H13
IAO
ICD
IEA
ITC
KQ8
KSI
ML0
M~E
O9-
OAWHX
OJQWA
OK1
PEELM
ROX
RXO
TOX
AAYXX
ABGNP
ADMLS
AFKRA
AMNDL
ARAPS
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
IMI
K7-
PHGZM
PHGZT
PIMPY
8FE
8FG
ABUWG
AZQEC
COVID
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c408t-28f420fb6ecc9db8a896f03f857dbc2f6bae531a8b8d0a6bbc09c642851c5b5f3
IEDL.DBID BENPR
ISSN 2057-2085
IngestDate Fri Jul 25 21:53:28 EDT 2025
Tue Jul 01 01:31:26 EDT 2025
Thu Apr 24 23:08:52 EDT 2025
Thu Dec 19 07:37:12 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords smart agriculture
video attestation
remote auditing
trusted computing
secure key exchange
Language English
License This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-28f420fb6ecc9db8a896f03f857dbc2f6bae531a8b8d0a6bbc09c642851c5b5f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0785-0457
OpenAccessLink https://www.proquest.com/docview/3168763541?pq-origsite=%requestingapplication%
PQID 3168763541
PQPubID 7121347
ParticipantIDs proquest_journals_3168763541
crossref_citationtrail_10_1093_cybsec_tyad012
crossref_primary_10_1093_cybsec_tyad012
oup_primary_10_1093_cybsec_tyad012
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-00-00
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – year: 2023
  text: 2023-00-00
PublicationDecade 2020
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Journal of cybersecurity (Oxford)
PublicationYear 2023
Publisher Oxford University Press
Publisher_xml – name: Oxford University Press
References Alsaedi (2023061412173667600_bib15) 2022; 20
Labbi (2023061412173667600_bib25) 2018
Ibrahim (2023061412173667600_bib22) 2022; 103
Qiu (2023061412173667600_bib19) 2021
Tang (2023061412173667600_bib26) 2021
Hadrović Zekić (2023061412173667600_bib4) 2021
Mclean (2023061412173667600_bib13) 2023
Mizher (2023061412173667600_bib14) 2021
Wang (2023061412173667600_bib8) 2022; 129
Jeffery (2023061412173667600_bib33) 2015; 60
Kang (2023061412173667600_bib17) 2021; 8
Nikouei (2023061412173667600_bib23) 2018
Benami (2023061412173667600_bib5) 2021; 2
Hadan (2023061412173667600_bib31) 2021; 7
Sysoieva (2023061412173667600_bib2) 2021; 7
Ayubi (2023061412173667600_bib35) 2021; 54
Snow (2023061412173667600_bib7) 2021; 80
Yin (2023061412173667600_bib32) 2018; 32
Nugraha (2023061412173667600_bib3) 2022; 8
Kabir (2023061412173667600_bib6) 2022; 4
Sowmya (2023061412173667600_bib18) 2018; 41
F-Secure (2023061412173667600_bib11) 2023
Jamil (2023061412173667600_bib21) 2022; 192
Xie (2023061412173667600_bib27) 2019; 7
Clayman (2023061412173667600_bib29) 2021
Woehl (2023061412173667600_bib1) 2021
Snider (2023061412173667600_bib10) 2021; 7
Patil (2023061412173667600_bib12) 2021
Xu (2023061412173667600_bib20) 2021; 10
Koryachko (2023061412173667600_bib28) 2021
Li (2023061412173667600_bib24) 2021
Shen (2023061412173667600_bib30) 2010
Anthi (2023061412173667600_bib16) 2021; 7
Tuli (2023061412173667600_bib34) 2019; 154
Limited (2023061412173667600_bib9) 2020
References_xml – volume: 10
  start-page: 76
  year: 2021
  ident: 2023061412173667600_bib20
  article-title: Decentralized video input authentication as an edge service for smart cities
  publication-title: IEEE Consum Electron Mag
  doi: 10.1109/MCE.2021.3062564
– volume: 103
  start-page: 108267
  year: 2022
  ident: 2023061412173667600_bib22
  article-title: Blockchain-based parking sharing service for smart city development
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2022.108267
– year: 2021
  ident: 2023061412173667600_bib1
  article-title: Cyber security threats to the food industry: consider the cloud
– start-page: 1110
  volume-title: 2nd International Conference on Electronics and Sustainable Communication Systems
  year: 2021
  ident: 2023061412173667600_bib12
  article-title: Deepfake Video Authentication Based on Blockchain
– volume: 129
  start-page: 68
  year: 2022
  ident: 2023061412173667600_bib8
  article-title: Evaluation of survey and remote sensing data products used to estimate land use change in the United States: evolving issues and emerging opportunities
  publication-title: Environ Sci Policy
  doi: 10.1016/j.envsci.2021.12.021
– volume: 2
  start-page: 140
  year: 2021
  ident: 2023061412173667600_bib5
  article-title: Uniting remote sensing, crop modelling and economics for agricultural risk management
  publication-title: Nat Rev Earth Environ
  doi: 10.1038/s43017-020-00122-y
– volume: 7
  start-page: tyab025
  year: 2021
  ident: 2023061412173667600_bib31
  article-title: A holistic analysis of web-based public key infrastructure failures: comparing experts’ perceptions and real-world incidents
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyab025
– volume: 54
  start-page: 1237
  year: 2021
  ident: 2023061412173667600_bib35
  article-title: A new chaotic complex map for robust video watermarking
  publication-title: Artifi Intell Rev
  doi: 10.1007/s10462-020-09877-8
– volume: 7
  start-page: 164
  year: 2021
  ident: 2023061412173667600_bib2
  article-title: Analysis of potential risks of audit of agricultural enterprises
  publication-title: Agric Resour Econ Int Sci E-J
  doi: 10.51599/are.2021.07.01.09
– volume: 60
  start-page: 102
  year: 2015
  ident: 2023061412173667600_bib33
  article-title: An empirical research agenda for understanding formal methods productivity
  publication-title: Inf Softw Technol
  doi: 10.1016/j.infsof.2014.11.005
– start-page: 1874
  volume-title: 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
  year: 2021
  ident: 2023061412173667600_bib24
  article-title: Application Model of Video Surveillance System Interworking Based on Blockchain
  doi: 10.1109/IMCEC51613.2021.9482064
– year: 2023
  ident: 2023061412173667600_bib13
  article-title: Must-know cyber attack statistics and trends
– start-page: 1
  volume-title: 10th Mediterranean Conference on Embedded Computing (MECO)
  year: 2021
  ident: 2023061412173667600_bib28
  article-title: Development of Cloud Video Conferencing System Based on Two-Phase Routing Networks
– start-page: 196
  volume-title: 7th International Conference on Network Softwarization (NetSoft)
  year: 2021
  ident: 2023061412173667600_bib29
  article-title: Managing Video Processing and Delivery Using Big Packet Protocol with SDN Controllers
– volume: 8
  start-page: 775
  year: 2021
  ident: 2023061412173667600_bib17
  article-title: Efficient data origin authentication scheme for video streaming transmitted by multiple senders
  publication-title: NATURAL VOLATILES and ESSENTIAL OILS (NVEO) Journal
– volume: 80
  start-page: 102225
  year: 2021
  ident: 2023061412173667600_bib7
  article-title: Energy audits and eco-feedback: exploring the barriers and facilitators of agricultural energy efficiency improvements on Australian farms
  publication-title: Energy Res Soc Sci
  doi: 10.1016/j.erss.2021.102225
– volume: 192
  start-page: 106573
  year: 2022
  ident: 2023061412173667600_bib21
  article-title: Optimal smart contract for autonomous greenhouse environment based on iot blockchain network in agriculture
  publication-title: Comput Electron Agric
  doi: 10.1016/j.compag.2021.106573
– volume: 41
  start-page: 159
  year: 2018
  ident: 2023061412173667600_bib18
  article-title: Video authentication using spatio temporal relationship for tampering detection
  publication-title: J Inf Secur Appl
– volume: 7
  start-page: tyab006
  year: 2021
  ident: 2023061412173667600_bib16
  article-title: A three-tiered intrusion detection system for industrial control systems
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyab006
– volume: 4
  start-page: 82
  year: 2022
  ident: 2023061412173667600_bib6
  article-title: Environmental sensing and remote communication for smart farming: a review
  publication-title: Precis Agric
– start-page: 791
  volume-title: International Conference on Information Technology
  year: 2021
  ident: 2023061412173667600_bib14
  article-title: Passive Object-based Video Authentication Using Stereo Statistical Descriptor on Wavelet Decomposition
– start-page: 656
  volume-title: The Proceedings of the Third International Conference on Smart City Applications
  year: 2018
  ident: 2023061412173667600_bib25
  article-title: Blockchain-based PKI for Content-Centric Networking
– year: 2020
  ident: 2023061412173667600_bib9
  article-title: Major farm standards adopt LRQA remote audit technology
– volume: 154
  start-page: 22
  year: 2019
  ident: 2023061412173667600_bib34
  article-title: Fogbus: a blockchain-based lightweight framework for edge and fog computing
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2019.04.050
– volume: 32
  start-page: 112
  year: 2018
  ident: 2023061412173667600_bib32
  article-title: Hyperconnected network: a decentralized trusted computing and networking paradigm
  publication-title: IEEE Network
  doi: 10.1109/MNET.2018.1700172
– start-page: 3
  year: 2021
  ident: 2023061412173667600_bib4
  article-title: Internal auditing in covid-19 environment: is remote auditing a solution?
  publication-title: Paper presented at FINIZ 2021—Are you Ready for the ContinuousNEXT® after Covid-19? Belgrade, Singidunum University, Serbia
– volume: 20
  start-page: 724
  year: 2022
  ident: 2023061412173667600_bib15
  article-title: USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2022.3143493
– start-page: 03086
  volume-title: E3S Web of Conferences
  year: 2021
  ident: 2023061412173667600_bib26
  article-title: Design and implementation of port video terminals security access authentication system using blockchain technology
– start-page: V2
  volume-title: 2nd International Conference on Signal Processing Systems
  year: 2010
  ident: 2023061412173667600_bib30
  article-title: The Security of Cloud Computing System Enabled by Trusted Computing Technology
– volume: 8
  start-page: tyac004
  year: 2022
  ident: 2023061412173667600_bib3
  article-title: Cybersecurity service level agreements: understanding government data confidentiality requirements
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyac004
– start-page: 56
  volume-title: 19th International Conference on Embedded and Ubiquitous Computing (EUC)
  year: 2021
  ident: 2023061412173667600_bib19
  article-title: A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks
– start-page: 1
  volume-title: 2018 IEEE International Smart Cities Conference (ISC2)
  year: 2018
  ident: 2023061412173667600_bib23
  article-title: Real-Time Index Authentication for Event-Oriented Surveillance Video Query Using Blockchain
  doi: 10.1109/ISC2.2018.8656668
– volume: 7
  start-page: 56656
  year: 2019
  ident: 2023061412173667600_bib27
  article-title: Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2913682
– year: 2023
  ident: 2023061412173667600_bib11
  article-title: A global survey showcasing the digital moments that matter most in 2023
– volume: 7
  start-page: tyab019
  year: 2021
  ident: 2023061412173667600_bib10
  article-title: Cyberattacks, cyber threats, and attitudes toward cybersecurity policies
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyab019
SSID ssj0001922476
Score 2.2212036
Snippet The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get...
SourceID proquest
crossref
oup
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Agricultural commodities
Digital signatures
Forensic computing
Frame design
Technology assessment
Video data
Video transmission
Title Realizing credible remote agricultural auditing with trusted video technology
URI https://www.proquest.com/docview/3168763541
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LTwIxEG4ELl58G1EkjTHx1FC6D7onowYkJqAhkHDb9GlICCBwwV_vdLcL4aBe9rJzmuk82_k-hO4jLZnitkUkZBMSRpIT4R6uMalMEARCs4w6odePu6PwbRyN_cBt5Z9VFjExC9R6rtyMvOEIlhx4Wth8XHwRxxrlblc9hUYJVSAEc2i-Ks_t_sdgN2VJIEXlDHNQmBBHSLlFbgwaaiNXRjXWG6Fpk-1lpr1ttyI8Zzmnc4KOfLGIn3LrnqIDMztDxwURA_Z-eY56Ayj3Jt-QhbADAJ3IqcFLA0YwWHwut-gaWLgVDCflpq84W7cwGrtNvDleb2fsF2jUaQ9fusTzJBAVUr4mjNuQUStjMEeiJRc8iS0NLI9aWipmYykMuJrgkmsqYikVTZTrO6KmimRkg0tUns1n5gphm9DEQvCEtomFUUATahgULULEQmoT6yoihY5S5UHEHZfFNM0vs4M012nqdVpFD1v5RQ6f8avkHaj8X6FaYZHU-9oq3Z2M679_36BDRxafD1BqqAxqNrdQUqxlHZV457XuT089a8zhO3wf_wDiutIn
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5ReqCXQoEKCrQWAnGy4ti7G-8BIURJwyMcEEjctn5WSCihSSQUflR_Y2f2EcQBOHHe0cqa-TwzHnvmA9hJvZVOxw63GE14klrNDT1ck9YFpZTxsqRO6F9kvevk9Ca9mYN_TS8MPatsfGLpqP3QUY28RQRLNDwtaR_c_-XEGkW3qw2FRgWLszB9wCPbeP_kJ9p3V8ru8dVRj9esAtwlQk-41DGRItoMF597q43OsyhU1GnHWydjZk1AYBpttRcms9aJ3FGWnrZdatOo8L8f4GOiVE47Snd_PdV0cgyIFZ8dpkGc6C9ncyJVy03tOLjWZGq8aMtncfBZb10TDMoI112Cz3Vqyg4rLH2BuTBYhsWG9oHVXmAF-peYXN4-YsxjNG701t4FNgpo8sDMn9Fslgcz1PBBUlTrZWVzR_CM-v6GbDKr6K_C9bvo7yvMD4aDsAYs5iKP6KrxkCaTVIlcBIkpkjGZsT5kfh14o6PC1SPLiTnjrqiuzlVR6bSodboOezP5-2pYx4uS26jyN4U2G4sU9c4eF084_Pb65x-w0LvqnxfnJxdnG_CJaOqr0s0mzKPKwxYmMxP7vUQQg9_vDdn_OJ4MbQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Realizing+credible+remote+agricultural+auditing+with+trusted+video+technology&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Mahmud%2C+Redowan&rft.au=Scarsbrook%2C+Joshua+D&rft.au=Ko%2C+Ryan+K+L&rft.au=Jarkas%2C+Omar&rft.date=2023&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=9&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyad012&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyad012
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon