Polynomial-based modifiable blockchain structure for removing fraud transactions
暂无分享,去创建一个
Wei Wang | Lichen Cheng | Kaitai Liang | Jiqiang Liu | Chunhua Su | Guangquan Xu | K. Liang | Guangquan Xu | Jiqiang Liu | Chunhua Su | Wei Wang | Lichen Cheng
[1] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[2] Yidong Li,et al. DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features , 2018, IEEE Access.
[3] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[4] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[5] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Xiangliang Zhang,et al. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.
[7] Yao Zhang,et al. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems , 2019, Inf. Sci..
[8] Hiroyuki Inaba,et al. Proposal of new authentication method in Wi-Fi access using Bitcoin 2.0 , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.
[9] Wanlei Zhou,et al. E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.
[10] Xiangliang Zhang,et al. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..
[11] Thomas Hardjono,et al. Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains , 2016, IoTPTS@AsiaCCS.
[12] Jitender S. Deogun,et al. Identity management using blockchain for cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[13] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[14] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[15] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[16] Vladimiro Sassone,et al. Privacy-Preserving Access Control in Cloud Federations , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).
[17] Xiangliang Zhang,et al. Abstracting massive data for lightweight intrusion detection in computer networks , 2016, Inf. Sci..
[18] E. Meijering,et al. A chronology of interpolation: from ancient astronomy to modern signal and image processing , 2002, Proc. IEEE.
[19] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[20] Vladimiro Sassone,et al. A Distributed Access Control System for Cloud Federations , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).