A Review on the Use of Blockchain for the Internet of Things
暂无分享,去创建一个
Tiago M. Fernández-Caramés | Paula Fraga-Lamas | T. Fernández-Caramés | P. Fraga-Lamas | Paula Fraga-Lamas
[1] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[2] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[3] L. Ren. Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .
[4] Dixys L. Hernández-Rojas,et al. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications , 2017, Sensors.
[5] Soumya Kanti Datta,et al. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).
[6] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[7] Vijay Sivaraman,et al. Secure lightweight context-driven data logging for bodyworn sensing devices , 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS).
[8] Joel J. P. C. Rodrigues,et al. Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.
[9] Axel Jantsch,et al. The Benefits of Self-Awareness and Attention in Fog and Mist Computing , 2015, Computer.
[10] Jordi Herrera-Joancomartí,et al. An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy , 2015, DPM/QASA@ESORICS.
[11] Tiago M. Fernández-Caramés,et al. An Intelligent Power Outlet System for the Smart Home of the Internet of Things , 2015, Int. J. Distributed Sens. Networks.
[12] Denis Lukianov,et al. Compact Confidential Transactions for Bitcoin , 2015 .
[13] David Mazières. The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .
[14] Tiago M. Fernández-Caramés,et al. Reverse engineering the communications protocol of an RFID public transportation card , 2017, 2017 IEEE International Conference on RFID (RFID).
[15] P. Fraga-Lamas,et al. Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).
[16] Shin-Ming Cheng,et al. On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[17] Zurina Mohd Hanapi,et al. Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[18] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[19] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[20] Muhammad Ibrahim,et al. Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm) , 2009, 2009 International Conference on Computer Technology and Development.
[21] Liming Zhu,et al. Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[22] Mohamed Hamdi,et al. Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).
[23] Paul G. Spirakis,et al. NanoPeer networks and P2P worlds , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[24] H. Viswanathan,et al. THE FUTURE of THE INTERNET of THINGS , 2016 .
[25] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[26] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[27] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[28] James V. Neel,et al. lessons from , 2010 .
[29] Máire O'Neill,et al. Practical homomorphic encryption: A survey , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).
[30] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[31] Nabil Bouzerna,et al. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[32] Erfaneh Noroozi,et al. Energy analysis for wireless sensor networks , 2010, 2010 2nd International Conference on Mechanical and Electronics Engineering.
[33] Thomas Lundqvist,et al. Thing-to-thing electricity micro payments using blockchain technology , 2017, 2017 Global Internet of Things Summit (GIoTS).
[34] Paulo Roberto de Oliveira,et al. Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems , 2014, IEEE Latin America Transactions.
[35] Kung Chen,et al. On design issues and architectural styles for blockchain-driven IoT services , 2017, 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW).
[36] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[37] Jason Cooper,et al. Securing user identity and transactions symbiotically: IoT meets blockchain , 2017, 2017 Global Internet of Things Summit (GIoTS).
[38] Tiago M. Fernández-Caramés,et al. Enabling automatic event detection for the pipe workshop of the shipyard 4.0 , 2017, 2017 56th FITCE Congress.
[39] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[40] Fred B. Schneider,et al. Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.
[41] Ralph Deters,et al. Internet of Smart Things - IoST: Using Blockchain and CLIPS to Make Things Autonomous , 2017, 2017 IEEE International Conference on Cognitive Computing (ICCC).
[42] Sachchidanand Singh,et al. Blockchain: Future of financial and cyber security , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
[43] Eng-Thiam Yeoh,et al. Comparison of ECC and RSA algorithm in multipurpose smart card application , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[44] Primavera De Filippi,et al. Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .
[45] Stefan Dziembowski,et al. Proofs of Space , 2015, CRYPTO.
[46] Paula Fraga Lamas. Enabling technologies and cyber-physical systems for mission-critical scenarios , 2017 .
[47] Susan Landau,et al. Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations , 2014, IEEE Security & Privacy.
[48] Siraj Raval,et al. Decentralized Applications: Harnessing Bitcoin's Blockchain Technology , 2016 .
[49] J. D. Bruce. The Mini-Blockchain Scheme , 2014 .
[50] Tiago M. Fernández-Caramés,et al. A Review on Industrial Augmented Reality Systems for the Industry 4.0 Shipyard , 2018, IEEE Access.
[51] David Cleary,et al. P2P Mobile Sensor Networks , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[52] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[53] Michael Bedford Taylor,et al. The Evolution of Bitcoin Hardware , 2017, Computer.
[54] Aleksandr Ometov,et al. Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[55] G. E. Town,et al. Towards an internet of energy , 2016, 2016 IEEE International Conference on Power System Technology (POWERCON).
[56] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[57] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[58] Tiago M. Fernández-Caramés,et al. A Review on Internet of Things for Defense and Public Safety , 2016, Sensors.
[59] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[60] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[61] Vallipuram Muthukkumarasamy,et al. Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[62] Xianbin Wang,et al. Recursive Principal Component Analysis-Based Data Outlier Detection and Sensor Data Aggregation in IoT Systems , 2017, IEEE Internet of Things Journal.
[63] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[64] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[65] Ibrar Yaqoob,et al. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.
[66] Alfred Menezes,et al. A Riddle Wrapped in an Enigma , 2016, IEEE Security & Privacy.
[67] Norman Meuschke,et al. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.
[68] Ben A. Amaba,et al. Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).
[69] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[70] M. Gonzalez-Lopez,et al. Maritime Freight Container Management System Using RFID , 2010 .
[71] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[72] Shin'ichiro Matsuo,et al. Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[73] Tiago M. Fernández-Caramés,et al. Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways , 2017, Sensors.
[74] Paula Fraga-Lamas,et al. Enabling technologies and cyber-physical systems for mission-critical scenarios , 2017 .
[75] Bryan Ford,et al. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[76] Tiago M. Fernández-Caramés,et al. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications , 2017, Sensors.
[77] Roberto Di Pietro,et al. CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT , 2017, 2017 IEEE International Conference on Communications (ICC).
[78] PRADIP KUMAR SHARMA,et al. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.
[79] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[80] Masaki Bandai,et al. Energy-Efficient Mobile P2P Communications Based on Context Awareness , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[81] Torsten Braun,et al. Passively Track WiFi Users With an Enhanced Particle Filter Using Power-Based Ranging , 2017, IEEE Transactions on Wireless Communications.
[82] David Wolinsky,et al. Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[83] Luis Castedo,et al. A Methodology for Evaluating Security in Commercial RFID Systems , 2017 .
[84] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[85] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[86] Alexandru Stanciu,et al. Blockchain Based Distributed Control System for Edge Computing , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).
[87] Srikanth V. Krishnamurthy,et al. Malicious co-residency on the cloud: Attacks and defense , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[88] Roy H. Campbell,et al. World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[89] Marko Vukolic,et al. Non-determinism in Byzantine Fault-Tolerant Replication , 2016, OPODIS.
[90] John Gray,et al. IoT-Based Techniques for Online M2M-Interactive Itemized Data Registration and Offline Information Traceability in a Digital Manufacturing System , 2017, IEEE Transactions on Industrial Informatics.
[91] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[92] Feng Wang,et al. Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[93] Burkhard Stiller,et al. Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[94] Ralph Deters,et al. Hosting Virtual IoT Resources on Edge-Hosts with Blockchain , 2016, 2016 IEEE International Conference on Computer and Information Technology (CIT).
[95] Tiago M. Fernández-Caramés,et al. A Practical Evaluation of Commercial Industrial Augmented Reality Systems in an Industry 4.0 Shipyard , 2018, IEEE Access.
[96] Feng Tian,et al. An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).
[97] Erwin Anggadjaja,et al. Internet of Things: Over-the-Air (OTA) firmware update in Lightweight mesh network protocol for smart urban development , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).
[98] Giuseppe Ateniese,et al. From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain , 2015, NSS.
[99] Susan Landau,et al. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.
[100] Tiago M. Fernández-Caramés,et al. Smart Pipe System for a Shipyard 4.0 , 2016, Sensors.
[101] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[102] Cheng Li,et al. A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).
[103] Jeffrey H. Reed,et al. Wireless distributed computing: a survey of research challenges , 2012, IEEE Communications Magazine.
[104] Tiago M. Fernández-Caramés,et al. VineSens: An Eco-Smart Decision-Support Viticulture System , 2017, Sensors.
[105] Ralph Deters,et al. Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[106] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[107] A. Takura,et al. A secure and trusted time stamping authority , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).
[108] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[109] Anastas Mishev,et al. Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.
[110] Vineet Sahula,et al. Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[111] Mohsen Guizani,et al. Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare , 2017, Computer.
[112] Zonyin Shae,et al. On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[113] Tiago M. Fernández-Caramés,et al. Real-time personal protective equipment monitoring system , 2012, Comput. Commun..
[114] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[115] Daniel Jeswin Nallathambi,et al. Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).
[116] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[117] Muneeb Ali,et al. CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[118] Michael Schukat,et al. Zero-knowledge proofs in M2M communication , 2014 .
[119] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[120] Bruce Schneier,et al. Practical cryptography , 2003 .
[121] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[122] Matthew J. Fanto,et al. SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations , 2005 .
[123] Luís Veiga,et al. Energy Efficiency Dilemma: P2P-cloud vs. Datacenter , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[124] Nirvana Meratnia,et al. Sensor fusion-based event detection in Wireless Sensor Networks , 2009, 2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous.
[125] Tiago M. Fernández-Caramés,et al. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications , 2016, Sensors.
[126] Peiqing Zhang,et al. Towards green P2P: Analysis of energy consumption in P2P and approaches to control , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).
[127] Matthew J. Fanto,et al. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations | NIST , 2005 .
[128] Michael T. Goodrich,et al. Accountable Storage , 2014, ACNS.
[129] Albert Levi,et al. Performance evaluation of public-key cryptosystem operations in WTLS protocol , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[130] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[131] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[132] Hongjin Kim,et al. Blockchain based smart door lock system , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).
[133] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[134] Salil S. Kanhere,et al. Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.
[135] C. Copeland,et al. Tangaroa : a Byzantine Fault Tolerant Raft , 2014 .
[136] Gregory D. Durgin,et al. On the Simon Cipher 4-block key schedule as a hash , 2017, 2017 IEEE International Conference on RFID (RFID).
[137] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[138] Mun Choon Chan,et al. Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors , 2017, IEEE Transactions on Mobile Computing.
[139] Kun Peng,et al. Attack against a batch zero-knowledge proof system , 2012, IET Inf. Secur..
[140] Tiago M. Fernández-Caramés,et al. Home Automation System Based on Intelligent Transducer Enablers , 2016, Sensors.
[141] Dongxi Liu,et al. Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.
[142] B. F. França,et al. Homomorphic Mini-blockchain Scheme , 2015 .
[143] Paula Fraga-Lamas,et al. Unleashing the Potential of LTE for Next Generation Railway Communications , 2015, Nets4Cars/Nets4Trains/Nets4Aircraft.
[144] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[145] Nicolas Courtois,et al. Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[146] Xin Li,et al. An IoT Data Communication Framework for Authenticity and Integrity , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[147] Athanasios V. Vasilakos,et al. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.
[148] Ralph Deters,et al. Wearable IoT Data Architecture , 2017, 2017 IEEE World Congress on Services (SERVICES).
[149] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[150] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[151] Kwangjo Kim,et al. TM-Coin: Trustworthy management of TCB measurements in IoT , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[152] George Danezis,et al. Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.
[153] Tiago M. Fernández-Caramés,et al. RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards , 2017, 2017 IEEE International Conference on RFID (RFID).
[154] Wei Xu,et al. EEP2P: An energy-efficient and economy-efficient P2P network protocol , 2014, International Green Computing Conference.
[155] Arjen K. Lenstra,et al. Factorization of a 768-Bit RSA Modulus , 2010, CRYPTO.
[156] N. Kshetri. Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .
[157] Tiago M. Fernández-Caramés,et al. An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy , 2017, Sensors.
[158] Omar Alfandi,et al. Analysis of cloud computing attacks and countermeasures , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).
[159] Prashant Nalini Vasudevan,et al. Proofs of Useful Work , 2017, IACR Cryptol. ePrint Arch..
[160] Dominic Wörner,et al. When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.
[161] Todd M. Austin,et al. Fault-based attack of RSA authentication , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).
[162] Nicola Fabiano,et al. The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard , 2017, 2017 International Conference on Internet of Things for the Global Community (IoTGC).
[163] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[164] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[165] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).