A new blockchain-based personal privacy protection scheme
暂无分享,去创建一个
Xin Liu | Xiu-Bo Chen | Mianxiong Dong | Yu-Long Gao | Xu Gang | Wen Liu | Wen Liu | M. Dong | Xiubo Chen | Gang Xu | Xin Liu | Yu-Long Gao
[1] Anirban Basu,et al. MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data , 2017, SpaCCS Workshops.
[2] Xindong Wu,et al. Data mining with big data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[3] Naixue Xiong,et al. Abnormal event detection in crowded scenes based on deep learning , 2016, Multimedia Tools and Applications.
[4] Yusheng Ji,et al. Mobile Edge Computing for the Internet of Vehicles: Offloading Framework and Job Scheduling , 2019, IEEE Vehicular Technology Magazine.
[5] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[6] Ashiq Anjum,et al. Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.
[7] Andreas Mitschele-Thiel,et al. Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture , 2017, IEEE Communications Magazine.
[8] Nn Van,et al. A Blockchain-based Access Control for Big Data , 2017 .
[9] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[10] Naixue Xiong,et al. On the throughput-energy tradeoff for data transmission between cloud and mobile devices , 2014, Inf. Sci..
[11] J. Mervis. U.S. science policy. Agencies rally to tackle big data. , 2012, Science.
[12] Yang Xiao,et al. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model , 2016, Inf. Sci..
[13] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[14] Guoping Zhang,et al. The Research of Access Control Based on UCON in the Internet of Things , 2011, J. Softw..
[15] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[16] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[17] Naixue Xiong,et al. A sustainable heuristic QoS routing algorithm for pervasive multi-layered satellite wireless networks , 2010, Wirel. Networks.
[18] Ittay Eyal,et al. Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities , 2017, Computer.
[19] Naixue Xiong,et al. Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks , 2013, Multimedia Tools and Applications.
[20] Feng Gao,et al. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.
[21] Yuan-Shun Dai,et al. Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.
[22] Qingyi Zhu,et al. Applications of Distributed Ledger Technologies to the Internet of Things , 2019, ACM Comput. Surv..
[23] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[24] P. Giungato,et al. Current Trends in Sustainability of Bitcoins and Related Blockchain Technology , 2017 .
[25] Praneeth Babu Marella,et al. Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .
[26] Ying Sun,et al. A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain , 2018, IEEE Access.
[27] Deepak Puthal,et al. The Blockchain as a Decentralized Security Framework [Future Directions] , 2018, IEEE Consumer Electronics Magazine.
[28] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[29] Ke Xiao,et al. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.
[30] Toshitaka Tsuda,et al. Data Driven Cyber-Physical System for Landslide Detection , 2019, Mob. Networks Appl..
[31] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[32] Gang Xu,et al. Secure multiparty computation of a comparison problem , 2016, SpringerPlus.