Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
暂无分享,去创建一个
Zilong Jin | Huiling Chen | Lejun Zhang | Weizheng Wang | Yansen Su | Minghui Peng | Yansen Su | Lejun Zhang | Weizheng Wang | Zilong Jin | Huiling Chen | Ming-Wei Peng
[1] Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
[2] Cong Wang,et al. Enabling Cloud Storage Auditing With Key-Exposure Resistance , 2015, IEEE Transactions on Information Forensics and Security.
[3] Jianhong Zhang,et al. Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing , 2019, IEEE Access.
[4] Binxing Fang,et al. A Survey on Access Control in the Age of Internet of Things , 2020, IEEE Internet of Things Journal.
[5] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[6] Xiaojiang Du,et al. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid , 2019, IEEE Communications Magazine.
[7] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[8] Xiaojiang Du,et al. CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques , 2021, IEEE Internet of Things Journal.
[9] Yansen Su,et al. Resource allocation and trust computing for blockchain-enabled edge computing system , 2021, Comput. Secur..
[10] Dong In Kim,et al. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory , 2018, IEEE Transactions on Vehicular Technology.
[11] Kim-Kwang Raymond Choo,et al. A smartphone-based wearable sensors for monitoring real-time physiological data , 2017, Comput. Electr. Eng..
[12] Cong Wang,et al. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2016, IEEE Transactions on Information Forensics and Security.
[13] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[14] Zhe Xia,et al. Secure Index for Resource-Constraint Mobile Devices in Cloud Computing , 2016, IEEE Access.
[15] Nadra Guizani,et al. A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks , 2020, IEEE Wireless Communications.
[16] Jong-Hyouk Lee,et al. A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing , 2020, IEEE Internet of Things Journal.
[17] Zhi Ding,et al. Wireless communications in the era of big data , 2015, IEEE Communications Magazine.
[18] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[19] Kai Fan,et al. Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).
[20] Ali Kashif Bashir,et al. Data mining and machine learning methods for sustainable smart cities traffic classification: A survey , 2020, Sustainable Cities and Society.
[21] Xiaojiang Du,et al. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city , 2020, Future Gener. Comput. Syst..
[22] Xiaojiang Du,et al. IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..
[23] Tao Xiang,et al. Secure Cloud Storage Meets with Secure Network Coding , 2016, IEEE Transactions on Computers.
[24] Xiao Xue,et al. Social Learning Evolution (SLE): Computational Experiment-Based Modeling Framework of Social Manufacturing , 2019, IEEE Transactions on Industrial Informatics.
[25] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[26] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[27] Lajos Hanzo,et al. Wireless information and power transfer: from scientific hypothesis to engineering practice , 2015, IEEE Communications Magazine.
[28] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..