BLWN: Blockchain-Based Lightweight Simplified Payment Verification in IoT-Assisted e-Healthcare
暂无分享,去创建一个
[1] Chi Zhang,et al. Protecting Access Privacy for Bitcoin Lightweight Client Using Trusted Hardware , 2019, 2019 IEEE/CIC International Conference on Communications in China (ICCC).
[2] Chi Zhang,et al. A Privacy-preserving Ethereum Lightweight Client Using PIR , 2019, 2019 IEEE/CIC International Conference on Communications in China (ICCC).
[3] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[4] Lingbo Wei,et al. Private Transaction Retrieval for Lightweight Bitcoin Client , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[5] Mubashir Husain Rehmani,et al. Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[6] Hannes Hartenstein,et al. Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.
[7] Nasir Ghani,et al. Bitcoin Concepts, Threats, and Machine-Learning Security Solutions , 2018, IEEE Access.
[8] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[9] Feng Gao,et al. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.
[10] Antônio A. de A. Rocha,et al. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.
[11] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[12] Aashaka Shah,et al. Empowering Light Nodes in Blockchains with Block Summarization , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[13] Shouhuai Xu,et al. Efficient Public Blockchain Client for Lightweight Users , 2018, EAI Endorsed Trans. Security Safety.
[14] Partha Pratim Ray. A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..
[15] Jamal Hayat Mosakheil. Security Threats Classification in Blockchains , 2018 .
[16] Ghassan O. Karame,et al. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..
[17] Hai Jin,et al. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone , 2018, IEEE Access.
[18] Joel J. P. C. Rodrigues,et al. Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.
[19] Tomoaki Ohtsuki,et al. Design of privacy-preserving mobile Bitcoin client based on γ-deniability enabled bloom filter , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[20] Ashok Kalal,et al. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2017 .
[21] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[22] Partha Pratim Ray,et al. A survey of IoT cloud platforms , 2016 .
[23] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[24] Ralph Deters,et al. Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[25] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[26] Muneeb Ali,et al. Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.
[27] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[28] Yongcai Wang,et al. On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms , 2016, ACM Comput. Surv..
[29] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[30] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[31] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[32] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[33] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[34] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[35] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[36] W. Whitt,et al. Choosing arrival process models for service systems: Tests of a nonhomogeneous Poisson process , 2014 .
[37] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[38] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[39] Maurice Herlihy,et al. Multidimensional approximate agreement in Byzantine asynchronous systems , 2013, STOC '13.
[40] Avishai Mandelbaum,et al. Statistical Analysis of a Telephone Call Center , 2005 .
[41] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[42] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.