A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[2] Elmar Fürst,et al. Blockchain for and in Logistics: What to Adopt and Where to Start , 2018, Logistics.
[3] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[4] Jianliang Xu,et al. GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[5] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[6] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[7] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[10] Chao Yang,et al. BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems , 2018, Journal of Medical Systems.
[11] Benedikt Notheisen,et al. Trading Real-World Assets on Blockchain , 2017, Business & Information Systems Engineering.
[12] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[13] Xiangliang Zhang,et al. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[14] Dongxi Liu,et al. Result Pattern Hiding Searchable Encryption for Conjunctive Queries , 2018, CCS.
[15] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[16] Michele Amoretti,et al. Blockchain-Based Proof of Location , 2016, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[17] Marten Risius,et al. A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services , 2017, Bus. Inf. Syst. Eng..
[18] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[19] Nick Szabo,et al. Smart Contracts: Building Blocks for Digital Markets , 2018 .
[20] Gabriel Ghinita,et al. An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical , 2014, CODASPY '14.
[21] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[22] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[23] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[24] Lucila Ohno-Machado,et al. ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks , 2018, ArXiv.
[25] Andreas Unterweger,et al. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions , 2018, Computer Science - Research and Development.
[26] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[27] Nallapaneni Manoj Kumar,et al. Blockchain technology for security issues and challenges in IoT , 2018 .
[28] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[29] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).