Smart contract for secure billing in ride-hailing service via blockchain
暂无分享,去创建一个
Zhenfu Cao | Haojin Zhu | Huajun Zhang | Erdong Deng | Haojin Zhu | Z. Cao | Huajun Zhang | Erdong Deng
[1] Rajesh K. Gupta,et al. Sensor localization with deterministic accuracy guarantee , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Yuan-Shun Dai,et al. Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.
[3] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Rafail Ostrovsky,et al. Position-Based Cryptography , 2014, SIAM J. Comput..
[6] Xuemin Shen,et al. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.
[7] Yih-Chun Hu,et al. Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.
[8] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Josep Domingo-Ferrer,et al. Co-utile P2P ridesharing via decentralization and reputation management , 2016 .
[10] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[11] Jean-Pierre Hubaux,et al. PrivateRide: A Privacy-Enhanced Ride-Hailing Service , 2017, Proc. Priv. Enhancing Technol..
[12] Athanasios V. Vasilakos,et al. Multimedia Processing Pricing Strategy in GPU-Accelerated Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[13] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[15] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[16] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[17] David Brumley,et al. GPS software attacks , 2012, CCS.
[18] Ran Canetti,et al. Security and composition of cryptographic protocols: a tutorial (part I) , 2006, SIGA.
[19] Yong Xiang,et al. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data , 2020, IEEE Transactions on Cloud Computing.
[20] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[21] Kotagiri Ramamohanarao,et al. Optimal Pick up Point Selection for Effective Ride Sharing , 2017, IEEE Transactions on Big Data.
[22] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[23] Serge Fehr,et al. One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games , 2013, EUROCRYPT.
[24] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[25] Christof Paar,et al. Secure Location Verification , 2010 .