Blockchain for IoT: The Challenges and a Way Forward
暂无分享,去创建一个
[1] Loveleen Gaur,et al. The Future of the Internet of Things , 2019, Internet of Things.
[2] Thomas Watteyne,et al. Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.
[3] Mattias Scherer,et al. Performance and Scalability of Blockchain Networks and Smart Contracts , 2017 .
[4] Joseph Poon,et al. Plasma : Scalable Autonomous Smart Contracts , 2017 .
[5] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[6] Ross Brewer,et al. Ransomware attacks: detection, prevention and cure , 2016, Netw. Secur..
[7] Jinjun Chen,et al. Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.
[8] Ahmad-Reza Sadeghi,et al. Invited: Can IoT be secured: Emerging challenges in connecting the unconnected , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[9] Sathish Alampalayam Kumar,et al. Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[10] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[11] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[12] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[13] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[14] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[15] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[16] S. Popov. The Tangle , 2015 .
[17] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[18] Prateek Saxena,et al. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains , 2015, IACR Cryptol. ePrint Arch..
[19] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[20] Alysson Neves Bessani,et al. State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[21] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[22] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[23] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[24] Ralph Langner,et al. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[25] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[26] Flavio Paiva Junqueira,et al. Zab: High-performance broadcast for primary-backup systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[27] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[28] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[29] Bernhard Koerber,et al. IT works , 2006, LOG IN.
[30] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[31] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[32] Wei Zheng,et al. Transactions , 2015 .