Blockchain as a solution for security attacks in named data networking of things
暂无分享,去创建一个
[1] Máire O'Neill,et al. Practical homomorphic encryption: A survey , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).
[2] Xu Chen,et al. Socially Motivated Data Caching in Ultra-Dense Small Cell Networks , 2017, IEEE Network.
[3] Ibrar Yaqoob,et al. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.
[4] Michael Bedford Taylor,et al. The Evolution of Bitcoin Hardware , 2017, Computer.
[5] Tiago M. Fernández-Caramés,et al. Enabling automatic event detection for the pipe workshop of the shipyard 4.0 , 2017, 2017 56th FITCE Congress.
[6] Feng Tian,et al. An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).
[7] Shin-Ming Cheng,et al. On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[8] Nikhil Sharma,et al. Architectural Model of Security Threats & theirCountermeasures in IoT , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).
[9] Athanasios V. Vasilakos,et al. Security of Cached Content in NDN , 2017, IEEE Transactions on Information Forensics and Security.
[10] Ralph Deters,et al. Wearable IoT Data Architecture , 2017, 2017 IEEE World Congress on Services (SERVICES).
[11] M. Gonzalez-Lopez,et al. Maritime Freight Container Management System Using RFID , 2010 .
[12] Fred B. Schneider,et al. Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.
[13] Erik Poll,et al. A security protocol for information-centric networking in smart grids , 2013, SEGS '13.
[14] Nikhil Sharma,et al. Authentication & Encryption Based Security Services in Blockchain Technology , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).
[15] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[16] Alexander Afanasyev,et al. Named Data Networking of Things (Invited Paper) , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[17] Jiyue Huang,et al. Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing , 2020, IEEE Transactions on Services Computing.
[18] Mohamed Hamdi,et al. Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).
[19] Luís Veiga,et al. Energy Efficiency Dilemma: P2P-cloud vs. Datacenter , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[20] Satyajayant Misra,et al. LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities , 2017, IEEE Internet of Things Journal.
[21] Nikhil Sharma,et al. Evolution of IoT & Data Analytics using Deep Learning , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).
[22] Axel Jantsch,et al. The Benefits of Self-Awareness and Attention in Fog and Mist Computing , 2015, Computer.
[23] Muneeb Ali,et al. CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[24] Michael Schukat,et al. Zero-knowledge proofs in M2M communication , 2014 .
[25] Tiago M. Fernández-Caramés,et al. Smart Pipe System for a Shipyard 4.0 , 2016, Sensors.
[26] Athanasios V. Vasilakos,et al. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.
[27] Mengjun Xie,et al. Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.
[28] Norman Meuschke,et al. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.
[29] Burkhard Stiller,et al. Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[30] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[31] Young-Jin Kim,et al. Resilient end-to-end message protection for large-scale cyber-physical system communications , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[32] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[33] Paula Fraga-Lamas,et al. Unleashing the Potential of LTE for Next Generation Railway Communications , 2015, Nets4Cars/Nets4Trains/Nets4Aircraft.
[34] Liming Zhu,et al. Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[35] Jian Mi,et al. Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization , 2016, Sensors.
[36] Susan Landau,et al. Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations , 2014, IEEE Security & Privacy.
[37] Susan Landau,et al. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.
[38] Peiqing Zhang,et al. Towards green P2P: Analysis of energy consumption in P2P and approaches to control , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).
[39] P. Fraga-Lamas,et al. Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).
[40] Tiago M. Fernández-Caramés,et al. RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards , 2017, 2017 IEEE International Conference on RFID (RFID).
[41] Wei Xu,et al. EEP2P: An energy-efficient and economy-efficient P2P network protocol , 2014, International Green Computing Conference.
[42] Priya Mahadevan,et al. Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.
[43] Feng Wang,et al. Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[44] Kun Peng,et al. Attack against a batch zero-knowledge proof system , 2012, IET Inf. Secur..
[45] Dixys L. Hernández-Rojas,et al. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications , 2017, Sensors.
[46] Hongjin Kim,et al. Blockchain based smart door lock system , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).