Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication
暂无分享,去创建一个
[1] Bogdan Carbunar,et al. Tithonus: A Bitcoin Based Censorship Resilient System , 2018, Proc. Priv. Enhancing Technol..
[2] Ian Goldberg,et al. SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.
[3] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[4] John Langford,et al. Provably Secure Steganography , 2009, IEEE Trans. Computers.
[5] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[6] Milad Nasr,et al. The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks , 2017, CCS.
[7] Pedro Moreno-Sanchez,et al. R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies , 2018, IACR Cryptol. ePrint Arch..
[8] André Ricardo Abed Grégio,et al. ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[9] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[10] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Eric Wustrow,et al. TapDance: End-to-Middle Anticensorship without Flow Blocking , 2014, USENIX Security Symposium.
[12] Evangelos Theodoridis,et al. SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.
[13] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[14] Klaus Wehrle,et al. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin , 2018, Financial Cryptography.
[15] Vinod Yegneswaran,et al. Bootstrapping Communications into an Anti-Censorship System , 2012, FOCI.
[16] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[17] Fabrizio Lamberti,et al. Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough? , 2018, Future Internet.
[18] Li Jun,et al. Smart Home System Based on IOT Technologies , 2013, 2013 International Conference on Computational and Information Sciences.
[19] Yasushi Shinjo,et al. VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls , 2014, NSDI.
[20] Vinod Yegneswaran,et al. StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.
[21] Gene Itkis,et al. Upper and Lower Bounds on Black-Box Steganography , 2008, Journal of Cryptology.
[22] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[23] Nikita Borisov,et al. Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.
[24] Klaus Wehrle,et al. POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store , 2016, CCS.