Realizing credible remote agricultural auditing with trusted video technology
The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance....
Saved in:
Published in | Journal of cybersecurity (Oxford) Vol. 9; no. 1 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Oxford
Oxford University Press
2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance. Its digital transformation, known as remote auditing, could address these limitations to a greater extent; however, it is still subject to diverse cyberattacks, including tampering with the video streams provided for verification. Since a detailed and concurrent forensic examination of videos during remote auditing significantly increases the computational burden on the network and infrastructure, alternative or complementary solutions should be developed. This paper outlines the technical feasibility of applying digital signatures over live video streams as a way to authenticate the source during remote auditing and thus contributes to limiting the scope of potential cyber threats. It proposes design options for realizing the authentication process with trusted computing technologies at different phases, from signing the videos to transmitting them through unreliable networks. A reference prototype is also developed based on the proposed end-to-end design to quantify the performance of trusted remote agricultural auditing in terms of the frame signing time, attack resistance, and resource overhead. |
---|---|
AbstractList | The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get obstructed by the lack of human resources, delayed response, and high frequency of location updates—resulting in poor quality and safety compliance. Its digital transformation, known as remote auditing, could address these limitations to a greater extent; however, it is still subject to diverse cyberattacks, including tampering with the video streams provided for verification. Since a detailed and concurrent forensic examination of videos during remote auditing significantly increases the computational burden on the network and infrastructure, alternative or complementary solutions should be developed. This paper outlines the technical feasibility of applying digital signatures over live video streams as a way to authenticate the source during remote auditing and thus contributes to limiting the scope of potential cyber threats. It proposes design options for realizing the authentication process with trusted computing technologies at different phases, from signing the videos to transmitting them through unreliable networks. A reference prototype is also developed based on the proposed end-to-end design to quantify the performance of trusted remote agricultural auditing in terms of the frame signing time, attack resistance, and resource overhead. |
Author | Smith, Stuart Marshall, Jonathan Scarsbrook, Joshua D Hall, Josh Mahmud, Redowan Jarkas, Omar Ko, Ryan K L |
Author_xml | – sequence: 1 givenname: Redowan orcidid: 0000-0003-0785-0457 surname: Mahmud fullname: Mahmud, Redowan email: md.redowan.mahmud@gmail.com – sequence: 2 givenname: Joshua D surname: Scarsbrook fullname: Scarsbrook, Joshua D – sequence: 3 givenname: Ryan K L surname: Ko fullname: Ko, Ryan K L – sequence: 4 givenname: Omar surname: Jarkas fullname: Jarkas, Omar – sequence: 5 givenname: Josh surname: Hall fullname: Hall, Josh – sequence: 6 givenname: Stuart surname: Smith fullname: Smith, Stuart – sequence: 7 givenname: Jonathan surname: Marshall fullname: Marshall, Jonathan |
BookMark | eNqFkM1LwzAYh4NMcM5dPRc8eeiWpE2aHmX4BRNB9FzyuWV0TU1Spf71dnR4EMTT-4P3ed4Xfudg0rhGA3CJ4ALBMlvKXgQtl7HnCiJ8AqYYkiLFw2rykxk5A_MQdhBCVGKcF3QKnl40r-2XbTaJ9FpZUevE672LOuEbb2VXx87zOuGdsvFAfdq4TaLvQtQq-bBKuyRquW1c7Tb9BTg1vA56fpwz8HZ3-7p6SNfP94-rm3Uqc8hiipnJMTSCailLJRhnJTUwM4wUSkhsqOCaZIgzwRTkVAgJS0lzzAiSRBCTzcDVeLf17r3TIVY71_lmeFlliLKCZiRHA5WPlPQuBK9NJW3k0bomem7rCsHq0F01dlcduxu0xS-t9XbPff-3cD0Krmv_Y78B32aG8g |
CitedBy_id | crossref_primary_10_1016_j_foodcont_2024_110460 crossref_primary_10_1016_j_jfp_2023_100196 |
Cites_doi | 10.1109/MCE.2021.3062564 10.1016/j.compeleceng.2022.108267 10.1016/j.envsci.2021.12.021 10.1038/s43017-020-00122-y 10.1093/cybsec/tyab025 10.1007/s10462-020-09877-8 10.51599/are.2021.07.01.09 10.1016/j.infsof.2014.11.005 10.1109/IMCEC51613.2021.9482064 10.1016/j.erss.2021.102225 10.1016/j.compag.2021.106573 10.1093/cybsec/tyab006 10.1016/j.jss.2019.04.050 10.1109/MNET.2018.1700172 10.1109/TDSC.2022.3143493 10.1093/cybsec/tyac004 10.1109/ISC2.2018.8656668 10.1109/ACCESS.2019.2913682 10.1093/cybsec/tyab019 |
ContentType | Journal Article |
Copyright | The Author(s) 2023. Published by Oxford University Press. 2023 The Author(s) 2023. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s) 2023. Published by Oxford University Press. 2023 – notice: The Author(s) 2023. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | TOX AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU COVID DWQXO GNUQQ HCIFZ JQ2 K7- P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
DOI | 10.1093/cybsec/tyad012 |
DatabaseName | Oxford Journals Open Access Collection (WRLC) CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Coronavirus Research Database ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database (ProQuest) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database (ProQuest) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition Coronavirus Research Database ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: TOX name: Oxford Journals Open Access Collection url: https://academic.oup.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2057-2093 |
ExternalDocumentID | 10_1093_cybsec_tyad012 10.1093/cybsec/tyad012 |
GroupedDBID | 0R~ 5VS AAFWJ AAMVS AAOGV AAPPN AAPXW AAVAP ABEJV ABPTD ABQLI ABXVV ACGFS ADBBV AENZO AFPKN AFULF ALMA_UNASSIGNED_HOLDINGS ALUQC ARCSS AVWKF BAYMD BCNDV BTTYL CIDKT EBS EJD GROUPED_DOAJ H13 IAO ICD IEA ITC KQ8 KSI ML0 M~E O9- OAWHX OJQWA OK1 PEELM ROX RXO TOX AAYXX ABGNP ADMLS AFKRA AMNDL ARAPS BENPR BGLVJ CCPQU CITATION HCIFZ IMI K7- PHGZM PHGZT PIMPY 8FE 8FG ABUWG AZQEC COVID DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c408t-28f420fb6ecc9db8a896f03f857dbc2f6bae531a8b8d0a6bbc09c642851c5b5f3 |
IEDL.DBID | BENPR |
ISSN | 2057-2085 |
IngestDate | Fri Jul 25 21:53:28 EDT 2025 Tue Jul 01 01:31:26 EDT 2025 Thu Apr 24 23:08:52 EDT 2025 Thu Dec 19 07:37:12 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | smart agriculture video attestation remote auditing trusted computing secure key exchange |
Language | English |
License | This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-28f420fb6ecc9db8a896f03f857dbc2f6bae531a8b8d0a6bbc09c642851c5b5f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0785-0457 |
OpenAccessLink | https://www.proquest.com/docview/3168763541?pq-origsite=%requestingapplication% |
PQID | 3168763541 |
PQPubID | 7121347 |
ParticipantIDs | proquest_journals_3168763541 crossref_citationtrail_10_1093_cybsec_tyad012 crossref_primary_10_1093_cybsec_tyad012 oup_primary_10_1093_cybsec_tyad012 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-00-00 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – year: 2023 text: 2023-00-00 |
PublicationDecade | 2020 |
PublicationPlace | Oxford |
PublicationPlace_xml | – name: Oxford |
PublicationTitle | Journal of cybersecurity (Oxford) |
PublicationYear | 2023 |
Publisher | Oxford University Press |
Publisher_xml | – name: Oxford University Press |
References | Alsaedi (2023061412173667600_bib15) 2022; 20 Labbi (2023061412173667600_bib25) 2018 Ibrahim (2023061412173667600_bib22) 2022; 103 Qiu (2023061412173667600_bib19) 2021 Tang (2023061412173667600_bib26) 2021 Hadrović Zekić (2023061412173667600_bib4) 2021 Mclean (2023061412173667600_bib13) 2023 Mizher (2023061412173667600_bib14) 2021 Wang (2023061412173667600_bib8) 2022; 129 Jeffery (2023061412173667600_bib33) 2015; 60 Kang (2023061412173667600_bib17) 2021; 8 Nikouei (2023061412173667600_bib23) 2018 Benami (2023061412173667600_bib5) 2021; 2 Hadan (2023061412173667600_bib31) 2021; 7 Sysoieva (2023061412173667600_bib2) 2021; 7 Ayubi (2023061412173667600_bib35) 2021; 54 Snow (2023061412173667600_bib7) 2021; 80 Yin (2023061412173667600_bib32) 2018; 32 Nugraha (2023061412173667600_bib3) 2022; 8 Kabir (2023061412173667600_bib6) 2022; 4 Sowmya (2023061412173667600_bib18) 2018; 41 F-Secure (2023061412173667600_bib11) 2023 Jamil (2023061412173667600_bib21) 2022; 192 Xie (2023061412173667600_bib27) 2019; 7 Clayman (2023061412173667600_bib29) 2021 Woehl (2023061412173667600_bib1) 2021 Snider (2023061412173667600_bib10) 2021; 7 Patil (2023061412173667600_bib12) 2021 Xu (2023061412173667600_bib20) 2021; 10 Koryachko (2023061412173667600_bib28) 2021 Li (2023061412173667600_bib24) 2021 Shen (2023061412173667600_bib30) 2010 Anthi (2023061412173667600_bib16) 2021; 7 Tuli (2023061412173667600_bib34) 2019; 154 Limited (2023061412173667600_bib9) 2020 |
References_xml | – volume: 10 start-page: 76 year: 2021 ident: 2023061412173667600_bib20 article-title: Decentralized video input authentication as an edge service for smart cities publication-title: IEEE Consum Electron Mag doi: 10.1109/MCE.2021.3062564 – volume: 103 start-page: 108267 year: 2022 ident: 2023061412173667600_bib22 article-title: Blockchain-based parking sharing service for smart city development publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2022.108267 – year: 2021 ident: 2023061412173667600_bib1 article-title: Cyber security threats to the food industry: consider the cloud – start-page: 1110 volume-title: 2nd International Conference on Electronics and Sustainable Communication Systems year: 2021 ident: 2023061412173667600_bib12 article-title: Deepfake Video Authentication Based on Blockchain – volume: 129 start-page: 68 year: 2022 ident: 2023061412173667600_bib8 article-title: Evaluation of survey and remote sensing data products used to estimate land use change in the United States: evolving issues and emerging opportunities publication-title: Environ Sci Policy doi: 10.1016/j.envsci.2021.12.021 – volume: 2 start-page: 140 year: 2021 ident: 2023061412173667600_bib5 article-title: Uniting remote sensing, crop modelling and economics for agricultural risk management publication-title: Nat Rev Earth Environ doi: 10.1038/s43017-020-00122-y – volume: 7 start-page: tyab025 year: 2021 ident: 2023061412173667600_bib31 article-title: A holistic analysis of web-based public key infrastructure failures: comparing experts’ perceptions and real-world incidents publication-title: J Cybersecur doi: 10.1093/cybsec/tyab025 – volume: 54 start-page: 1237 year: 2021 ident: 2023061412173667600_bib35 article-title: A new chaotic complex map for robust video watermarking publication-title: Artifi Intell Rev doi: 10.1007/s10462-020-09877-8 – volume: 7 start-page: 164 year: 2021 ident: 2023061412173667600_bib2 article-title: Analysis of potential risks of audit of agricultural enterprises publication-title: Agric Resour Econ Int Sci E-J doi: 10.51599/are.2021.07.01.09 – volume: 60 start-page: 102 year: 2015 ident: 2023061412173667600_bib33 article-title: An empirical research agenda for understanding formal methods productivity publication-title: Inf Softw Technol doi: 10.1016/j.infsof.2014.11.005 – start-page: 1874 volume-title: 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) year: 2021 ident: 2023061412173667600_bib24 article-title: Application Model of Video Surveillance System Interworking Based on Blockchain doi: 10.1109/IMCEC51613.2021.9482064 – year: 2023 ident: 2023061412173667600_bib13 article-title: Must-know cyber attack statistics and trends – start-page: 1 volume-title: 10th Mediterranean Conference on Embedded Computing (MECO) year: 2021 ident: 2023061412173667600_bib28 article-title: Development of Cloud Video Conferencing System Based on Two-Phase Routing Networks – start-page: 196 volume-title: 7th International Conference on Network Softwarization (NetSoft) year: 2021 ident: 2023061412173667600_bib29 article-title: Managing Video Processing and Delivery Using Big Packet Protocol with SDN Controllers – volume: 8 start-page: 775 year: 2021 ident: 2023061412173667600_bib17 article-title: Efficient data origin authentication scheme for video streaming transmitted by multiple senders publication-title: NATURAL VOLATILES and ESSENTIAL OILS (NVEO) Journal – volume: 80 start-page: 102225 year: 2021 ident: 2023061412173667600_bib7 article-title: Energy audits and eco-feedback: exploring the barriers and facilitators of agricultural energy efficiency improvements on Australian farms publication-title: Energy Res Soc Sci doi: 10.1016/j.erss.2021.102225 – volume: 192 start-page: 106573 year: 2022 ident: 2023061412173667600_bib21 article-title: Optimal smart contract for autonomous greenhouse environment based on iot blockchain network in agriculture publication-title: Comput Electron Agric doi: 10.1016/j.compag.2021.106573 – volume: 41 start-page: 159 year: 2018 ident: 2023061412173667600_bib18 article-title: Video authentication using spatio temporal relationship for tampering detection publication-title: J Inf Secur Appl – volume: 7 start-page: tyab006 year: 2021 ident: 2023061412173667600_bib16 article-title: A three-tiered intrusion detection system for industrial control systems publication-title: J Cybersecur doi: 10.1093/cybsec/tyab006 – volume: 4 start-page: 82 year: 2022 ident: 2023061412173667600_bib6 article-title: Environmental sensing and remote communication for smart farming: a review publication-title: Precis Agric – start-page: 791 volume-title: International Conference on Information Technology year: 2021 ident: 2023061412173667600_bib14 article-title: Passive Object-based Video Authentication Using Stereo Statistical Descriptor on Wavelet Decomposition – start-page: 656 volume-title: The Proceedings of the Third International Conference on Smart City Applications year: 2018 ident: 2023061412173667600_bib25 article-title: Blockchain-based PKI for Content-Centric Networking – year: 2020 ident: 2023061412173667600_bib9 article-title: Major farm standards adopt LRQA remote audit technology – volume: 154 start-page: 22 year: 2019 ident: 2023061412173667600_bib34 article-title: Fogbus: a blockchain-based lightweight framework for edge and fog computing publication-title: J Syst Softw doi: 10.1016/j.jss.2019.04.050 – volume: 32 start-page: 112 year: 2018 ident: 2023061412173667600_bib32 article-title: Hyperconnected network: a decentralized trusted computing and networking paradigm publication-title: IEEE Network doi: 10.1109/MNET.2018.1700172 – start-page: 3 year: 2021 ident: 2023061412173667600_bib4 article-title: Internal auditing in covid-19 environment: is remote auditing a solution? publication-title: Paper presented at FINIZ 2021—Are you Ready for the ContinuousNEXT® after Covid-19? Belgrade, Singidunum University, Serbia – volume: 20 start-page: 724 year: 2022 ident: 2023061412173667600_bib15 article-title: USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data publication-title: IEEE Trans Dependable Secure Comput doi: 10.1109/TDSC.2022.3143493 – start-page: 03086 volume-title: E3S Web of Conferences year: 2021 ident: 2023061412173667600_bib26 article-title: Design and implementation of port video terminals security access authentication system using blockchain technology – start-page: V2 volume-title: 2nd International Conference on Signal Processing Systems year: 2010 ident: 2023061412173667600_bib30 article-title: The Security of Cloud Computing System Enabled by Trusted Computing Technology – volume: 8 start-page: tyac004 year: 2022 ident: 2023061412173667600_bib3 article-title: Cybersecurity service level agreements: understanding government data confidentiality requirements publication-title: J Cybersecur doi: 10.1093/cybsec/tyac004 – start-page: 56 volume-title: 19th International Conference on Embedded and Ubiquitous Computing (EUC) year: 2021 ident: 2023061412173667600_bib19 article-title: A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks – start-page: 1 volume-title: 2018 IEEE International Smart Cities Conference (ISC2) year: 2018 ident: 2023061412173667600_bib23 article-title: Real-Time Index Authentication for Event-Oriented Surveillance Video Query Using Blockchain doi: 10.1109/ISC2.2018.8656668 – volume: 7 start-page: 56656 year: 2019 ident: 2023061412173667600_bib27 article-title: Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2913682 – year: 2023 ident: 2023061412173667600_bib11 article-title: A global survey showcasing the digital moments that matter most in 2023 – volume: 7 start-page: tyab019 year: 2021 ident: 2023061412173667600_bib10 article-title: Cyberattacks, cyber threats, and attitudes toward cybersecurity policies publication-title: J Cybersecur doi: 10.1093/cybsec/tyab019 |
SSID | ssj0001922476 |
Score | 2.2212036 |
Snippet | The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get... |
SourceID | proquest crossref oup |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
SubjectTerms | Agricultural commodities Digital signatures Forensic computing Frame design Technology assessment Video data Video transmission |
Title | Realizing credible remote agricultural auditing with trusted video technology |
URI | https://www.proquest.com/docview/3168763541 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LTwIxEG4ELl58G1EkjTHx1FC6D7onowYkJqAhkHDb9GlICCBwwV_vdLcL4aBe9rJzmuk82_k-hO4jLZnitkUkZBMSRpIT4R6uMalMEARCs4w6odePu6PwbRyN_cBt5Z9VFjExC9R6rtyMvOEIlhx4Wth8XHwRxxrlblc9hUYJVSAEc2i-Ks_t_sdgN2VJIEXlDHNQmBBHSLlFbgwaaiNXRjXWG6Fpk-1lpr1ttyI8Zzmnc4KOfLGIn3LrnqIDMztDxwURA_Z-eY56Ayj3Jt-QhbADAJ3IqcFLA0YwWHwut-gaWLgVDCflpq84W7cwGrtNvDleb2fsF2jUaQ9fusTzJBAVUr4mjNuQUStjMEeiJRc8iS0NLI9aWipmYykMuJrgkmsqYikVTZTrO6KmimRkg0tUns1n5gphm9DEQvCEtomFUUATahgULULEQmoT6yoihY5S5UHEHZfFNM0vs4M012nqdVpFD1v5RQ6f8avkHaj8X6FaYZHU-9oq3Z2M679_36BDRxafD1BqqAxqNrdQUqxlHZV457XuT089a8zhO3wf_wDiutIn |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5ReqCXQoEKCrQWAnGy4ti7G-8BIURJwyMcEEjctn5WSCihSSQUflR_Y2f2EcQBOHHe0cqa-TwzHnvmA9hJvZVOxw63GE14klrNDT1ck9YFpZTxsqRO6F9kvevk9Ca9mYN_TS8MPatsfGLpqP3QUY28RQRLNDwtaR_c_-XEGkW3qw2FRgWLszB9wCPbeP_kJ9p3V8ru8dVRj9esAtwlQk-41DGRItoMF597q43OsyhU1GnHWydjZk1AYBpttRcms9aJ3FGWnrZdatOo8L8f4GOiVE47Snd_PdV0cgyIFZ8dpkGc6C9ncyJVy03tOLjWZGq8aMtncfBZb10TDMoI112Cz3Vqyg4rLH2BuTBYhsWG9oHVXmAF-peYXN4-YsxjNG701t4FNgpo8sDMn9Fslgcz1PBBUlTrZWVzR_CM-v6GbDKr6K_C9bvo7yvMD4aDsAYs5iKP6KrxkCaTVIlcBIkpkjGZsT5kfh14o6PC1SPLiTnjrqiuzlVR6bSodboOezP5-2pYx4uS26jyN4U2G4sU9c4eF084_Pb65x-w0LvqnxfnJxdnG_CJaOqr0s0mzKPKwxYmMxP7vUQQg9_vDdn_OJ4MbQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Realizing+credible+remote+agricultural+auditing+with+trusted+video+technology&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Mahmud%2C+Redowan&rft.au=Scarsbrook%2C+Joshua+D&rft.au=Ko%2C+Ryan+K+L&rft.au=Jarkas%2C+Omar&rft.date=2023&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=9&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyad012&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyad012 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon |