Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Lei Zhang | Xinyu Meng | Tong Chen | Rui Zhang | K. Choo | Rui Zhang | Lei Zhang | Tong Chen | Xinyu Meng
[1] Lei Zhang,et al. Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing , 2022, IEEE Transactions on Cloud Computing.
[2] Kim-Kwang Raymond Choo,et al. Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities , 2022, IEEE Transactions on Services Computing.
[3] Ning Zhang,et al. LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue , 2020, IEEE Transactions on Dependable and Secure Computing.
[4] Lei Zhang,et al. Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.
[5] Yuanfei Zhang,et al. Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.
[6] Lei Zhang,et al. Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home , 2020, IEEE Internet of Things Journal.
[7] Tongtong Li,et al. Bitcoin and Blockchain: Security and Privacy , 2019, IEEE Internet of Things Journal.
[8] Qi Zhang,et al. Sidechain technologies in blockchain networks: An examination and state-of-the-art review , 2020, J. Netw. Comput. Appl..
[9] Hao Zhang,et al. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..
[10] Lei Zhang,et al. Blockchain based secure data sharing system for Internet of vehicles: A position paper , 2019, Veh. Commun..
[11] Yue Zhang,et al. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..
[12] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[13] Jules Pagna Disso,et al. An Analysis into the Scalability of Bitcoin and Ethereum , 2018, Advances in Intelligent Systems and Computing.
[14] Mohammad S. Obaidat,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..
[15] Karen A. Scarfone,et al. Blockchain Technology Overview , 2018, ArXiv.
[16] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[17] Min Chen,et al. Towards collusion-attack-resilient group key management using one-way function tree , 2016, Comput. Networks.
[18] Shaoquan Jiang,et al. Group Key Agreement with Local Connectivity , 2016, IEEE Transactions on Dependable and Secure Computing.
[19] Bülent Tavli,et al. Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies , 2016, Ad Hoc Networks.
[20] Josep Domingo-Ferrer,et al. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts , 2016, IEEE Transactions on Computers.
[21] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[22] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[23] Ilka Philippow,et al. A Survey on Usage Scenarios for Requirements Traceability in Practice , 2013, REFSQ.
[24] Shigeo Mitsunari. A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor , 2013, IACR Cryptol. ePrint Arch..
[25] David Pointcheval,et al. Decentralized Dynamic Broadcast Encryption , 2012, SCN.
[26] Renaud Dubois,et al. Improved Broadcast Encryption Scheme with Constant-Size Ciphertext , 2012, Pairing.
[27] Josep Domingo-Ferrer,et al. Bridging Broadcast Encryption and Group Key Agreement , 2011, ASIACRYPT.
[28] Siaw-Lynn Ng,et al. Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[29] Moni Naor,et al. Efficient trace and revoke schemes , 2000, International Journal of Information Security.
[30] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[31] Qi Ying. Study on Collective Ball behind Wooden Bucket Principle , 2009 .
[32] Jason Smith,et al. A User-Centric Protocol for Conditional Anonymity Revocation , 2008, TrustBus.
[33] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[34] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[35] Dan Boneh,et al. Applications of Multilinear Forms to Cryptography , 2002, IACR Cryptol. ePrint Arch..