Achieving IoT data security based blockchain
暂无分享,去创建一个
Dan Liao | Wang Wentao | Ming Zhang | Hui Li | Xiong Wang | Chen Xue | M. Zhang | W. Wentao | D. Liao | Xiong Wang | Hui Li | Chen Xue
[1] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[2] Xiaohong Huang,et al. LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem , 2018, IEEE Access.
[3] Eryk Dutkiewicz,et al. Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities , 2019, IEEE Access.
[4] Christos Kotselidis,et al. Demystifying Crypto-Mining: Analysis and Optimizations of Memory-Hard PoW Algorithms , 2019, 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).
[5] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[6] Aleksander Berentsen. Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.
[7] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[8] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[9] Nan Jiang,et al. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts , 2020, Comput. Secur..
[10] Wei Zhou,et al. Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism , 2019, IEEE Access.
[11] Albert Y. Zomaya,et al. Blockchain for smart communities: Applications, challenges and opportunities , 2019, J. Netw. Comput. Appl..
[12] Eric A. Brewer,et al. Towards robust distributed systems (abstract) , 2000, PODC '00.
[13] Keke Gai,et al. Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..
[14] Anita Singhrova,et al. Fuzzy based priority aware scheduling technique for dense industrial IoT networks , 2019, J. Netw. Comput. Appl..
[15] Fahad Saleh,et al. Blockchain Without Waste: Proof-of-Stake , 2020, The Review of Financial Studies.
[16] Chen Wang,et al. Recent advances in consensus protocols for blockchain: a survey , 2019, Wireless Networks.
[17] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[18] B. B. Zaidan,et al. A review of smart home applications based on Internet of Things , 2017, J. Netw. Comput. Appl..
[19] Eric A. Brewer,et al. Harvest, yield, and scalable tolerant systems , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.
[20] Muttukrishnan Rajarajan,et al. Blockchain at the Edge: Performance of Resource-Constrained IoT Networks , 2021, IEEE Transactions on Parallel and Distributed Systems.
[21] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[22] Prateek Saxena,et al. Exploiting the laws of order in smart contracts , 2018, ISSTA.
[23] Suhyun Kim,et al. Blockchain-based Notarization for Social Media , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[24] Hong-Ning Dai,et al. An Overview on Smart Contracts: Challenges, Advances and Platforms , 2019, Future Gener. Comput. Syst..
[25] Jolanda G. Tromp,et al. Smart Bicycle: IoT-Based Transportation Service , 2020 .
[26] Nancy A. Lynch,et al. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.
[27] Brian W. Kernighan,et al. The Go Programming Language , 2015 .
[28] Paul Rad,et al. Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities , 2019, J. Netw. Comput. Appl..
[29] Marko Vukolic,et al. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2018, DSN.
[30] Vijay Varadharajan,et al. Policy-based access control for constrained healthcare resources in the context of the Internet of Things , 2019, J. Netw. Comput. Appl..
[31] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.