暂无分享,去创建一个
[1] E. Felten,et al. Bitcoin and Cryptocurrency Technologies: a , 2022 .
[2] Juha Partala,et al. Provably Secure Covert Communication on Blockchain , 2018, Cryptogr..
[3] Said Esmail El-Khamy,et al. A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption , 2016, Multimedia Tools and Applications.
[4] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[5] Yang Xu,et al. Towards Secure Network Computing Services for Lightweight Clients Using Blockchain , 2018, Wirel. Commun. Mob. Comput..
[6] Ramadhan J. Mstafa,et al. A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes , 2015, Multimedia Tools and Applications.
[7] Zhang Zhijie,et al. A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen , 2020, Computers, Materials & Continua.
[8] Chin-Chen Chang,et al. Blockchain based searchable encryption for electronic health record sharing , 2019, Future Gener. Comput. Syst..
[9] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[10] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[11] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[12] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[13] Guorui Feng,et al. Broadcasting Steganography in the Blockchain , 2019, IWDW.
[14] Eko Hari Rachmawanto,et al. Secure Image Steganography Algorithm Based on DCT with OTP Encryption , 2017 .
[15] Laura Ricci,et al. Blockchain Based Access Control , 2017, DAIS.
[16] Feng Hao,et al. A Smart Contract for Boardroom Voting with Maximum Voter Privacy , 2017, IACR Cryptol. ePrint Arch..