Performance of Hash Functions in Blockchain Applied to IoT Devices
暂无分享,去创建一个
Mário Antunes | Jéssica Ferreira | Mykyta Zhygulskyy | Luís Frazão | Luís Frazão | Mário Antunes | Jéssica Ferreira | Mykyta Zhygulskyy
[1] Miroslav Vujić,et al. Classification of Security Risks in the IoT Environment , 2016 .
[2] Andrejs Romanovs,et al. The Advantages and Disadvantages of the Blockchain Technology , 2018, 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE).
[3] Rüdiger Schollmeier,et al. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[4] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[5] William Stallings,et al. Cryptography and network security , 1998 .
[6] Judith Gurney. BP Statistical Review of World Energy , 1985 .
[7] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[8] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[9] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[10] Arati Baliga,et al. Understanding Blockchain Consensus Models , 2017 .
[11] Ahmed Banafa,et al. IoT and Blockchain Convergence: Benefits and Challenges , 2017 .