BTNC: A blockchain based trusted network connection protocol in IoT
暂无分享,去创建一个
Jianfeng Ma | Di Lu | Zhuzhu Wang | Lei Shang | Junwei Zhang | Jianfeng Ma | D. Lu | Lei Shang | Junwei Zhang | Zhuzhu Wang
[1] Keke Gai,et al. Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..
[2] Yang Liu,et al. EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid , 2020, IEEE Transactions on Industrial Informatics.
[3] Bin Zhao,et al. Efficient ID-based registration protocol featured with user anonymity in mobile IP networks , 2010, IEEE Transactions on Wireless Communications.
[4] Keke Gai,et al. Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.
[5] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[6] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[7] Keke Gai,et al. Blockchain-Enabled Reengineering of Cloud Datacenters , 2018, IEEE Cloud Computing.
[8] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[9] Feng Hao,et al. Authenticated Key Exchange over Bitcoin , 2015, SSR.
[10] Jamie Cross,et al. Application of Airborne LiDAR Data and Geographic Information Systems (GIS) to Develop a Distributed Generation System for the Town of Normal, IL , 2015 .
[11] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[12] Keke Gai,et al. Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.
[13] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[14] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[15] Kwangjo Kim,et al. TM-Coin: Trustworthy management of TCB measurements in IoT , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[16] Chao Yang,et al. BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems , 2018, Journal of Medical Systems.
[17] Ximeng Liu,et al. Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory , 2019, IEEE Transactions on Vehicular Technology.
[18] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[19] Victor C. M. Leung,et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.
[20] Bojan Cukic,et al. Trust-Based Development Framework for Distributed Systems and IoT , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[21] Jianfeng Ma,et al. Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.
[22] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[23] William L. Anderson,et al. The Microsoft Corporation in Collision with Antitrust Law , 2001 .
[24] Meikang Qiu,et al. Differential Privacy-Based Blockchain for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[25] Chao Yang,et al. LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices , 2018, Wirel. Commun. Mob. Comput..
[26] Keke Gai,et al. Multi-Access Filtering for Privacy-Preserving Fog Computing , 2022, IEEE Transactions on Cloud Computing.
[27] Anupam Datta,et al. Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations , 2005 .
[28] Rüdiger Schollmeier,et al. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[29] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[30] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[31] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[32] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[33] Yang Liu,et al. Lightweight Privacy-Preserving Ensemble Classification for Face Recognition , 2019, IEEE Internet of Things Journal.
[34] Feifei Li,et al. Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices , 2019, IEEE Internet of Things Journal.
[35] Keke Gai,et al. A survey on FinTech , 2018, J. Netw. Comput. Appl..
[36] Yang Liu,et al. Privacy-Preserving Object Detection for Medical Images With Faster R-CNN , 2019, IEEE Transactions on Information Forensics and Security.