Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things
暂无分享,去创建一个
Yongjun Ren | Jin Wang | Osama Alfarraj | Amr Tolba | Fujian Zhu | Pradip Kumar Sharma | Tian Wang | O. Alfarraj | Tian Wang | P. Sharma | A. Tolba | Yongjun Ren | Jin Wang | Fujian Zhu
[1] Jiafu Wan,et al. A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.
[2] Tao Feng,et al. Research on trusted DNP3-BAE protocol based on hash chain , 2018, EURASIP Journal on Wireless Communications and Networking.
[3] Alix E. Rojas,et al. Methodological Approach to the Definition of a Blockchain System for the Food Industry Supply Chain Traceability , 2018, ICCSA.
[4] Md. Zakirul Alam Bhuiyan,et al. Blockchain and Big Data to Transform the Healthcare , 2018, ICDPA 2018.
[5] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[6] Takahiro Hara,et al. ETC-IoT: Edge-Node-Assisted Transmitting for the Cloud-Centric Internet of Things , 2018, IEEE Network.
[7] Ke Gu,et al. Location Data Record Privacy Protection based on Differential Privacy Mechanism , 2018, Inf. Technol. Control..
[8] Chien Chen,et al. Dynamic reordering bloom filter , 2017, 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[9] MyungKeun Yoon,et al. Bloom tree: A search tree based on Bloom filters for multiple-set membership testing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[10] Wei Ni,et al. Survey on blockchain for Internet of Things , 2019, Comput. Commun..
[11] Yan Leng,et al. Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network , 2019, Sensors.
[12] Wenbing Wu,et al. An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks , 2019 .
[13] Qirun Wang,et al. Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States , 2019 .
[14] Arun Kumar Sangaiah,et al. Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant , 2019, Secur. Commun. Networks.
[15] Kim-Kwang Raymond Choo,et al. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.
[16] Hong Liu,et al. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.
[17] Yongjun Ren,et al. Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage , 2018, ICCCS.
[18] Yuansheng Luo,et al. A Decision Function Based Smart Charging and Discharging Strategy for Electric Vehicle in Smart Grid , 2018, Mobile Networks and Applications.
[19] Yan Leng,et al. Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.
[20] Amr Tolba. Content accessibility preference approach for improving service optimality in internet of vehicles , 2019, Comput. Networks.
[21] Ali Vatankhah Barenji,et al. A Blockchain and AutoML Approach for Open and Automated Customer Service , 2019, IEEE Transactions on Industrial Informatics.
[22] Feng Tian,et al. An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).
[23] Fei Yu,et al. On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks , 2017, KSII Trans. Internet Inf. Syst..
[24] Sai Ji,et al. Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks , 2018, Mob. Inf. Syst..
[25] Bin Zheng,et al. A robust distance-based relay selection for message dissemination in vehicular network , 2018, Wireless Networks.
[26] Amr Tolba,et al. A Three-Tier Architecture for Securing IoV Communications Using Vehicular Dependencies , 2019, IEEE Access.
[27] David M. Brooks,et al. The design of a bloom filter hardware accelerator for ultra low power systems , 2009, ISLPED.
[28] Arun Kumar Sangaiah,et al. An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.
[29] Shao Qi-feng,et al. Blockchain : Architecture and Research Progress , 2017 .
[30] Jun Chen,et al. A Cluster Correlation power analysis against double blinding exponentiation , 2019, J. Inf. Secur. Appl..
[31] David Hung-Chang Du,et al. A Forest-structured Bloom Filter with flash memory , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).
[32] Jin Wang,et al. Complexity and Algorithms for Superposed Data Uploading Problem in Networks With Smart Devices , 2020, IEEE Internet of Things Journal.
[33] Yuchen Yang,et al. Blockchain application in food supply information security , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).
[34] Jin Wang,et al. A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .
[35] Guido Governatori,et al. Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.
[36] Xiwei Xu,et al. Adaptable Blockchain-Based Systems: A Case Study for Product Traceability , 2017, IEEE Software.
[37] Arun Kumar Sangaiah,et al. An Energy-Efficient Off-Loading Scheme for Low Latency in Collaborative Edge Computing , 2019, IEEE Access.
[38] Muwei Jian,et al. A Visual Secret Sharing Scheme Based on Improved Local Binary Pattern , 2018, Int. J. Pattern Recognit. Artif. Intell..
[39] Yongjun Ren,et al. Digital Continuity Guarantee Based on Data Consistency in Cloud Storage , 2018, ICCCS.
[40] Yi Mu,et al. New Approach for Privacy-Aware Location-Based Service Communications , 2018, Wirel. Pers. Commun..
[41] Yingchi Mao,et al. DNN-MVL: DNN-Multi-View-Learning-Based Recover Block Missing Data in a Dam Safety Monitoring System , 2019, Sensors.
[42] Jinyue Xia,et al. Quantum Communication Networks and Trust Management: A Survey , 2019 .
[43] Chunhua Su,et al. A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine , 2020, Inf. Sci..
[44] Zhenyu Wen,et al. THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network , 2020, IEEE Internet of Things Journal.
[45] Jinyue Xia,et al. Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds , 2019, IEEE Transactions on Dependable and Secure Computing.
[46] Marcel Antal,et al. Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids , 2018, Sensors.
[47] Hye-Jin Kim,et al. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..
[48] Wei Liu,et al. Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2019, Sensors.
[49] Bo Yang,et al. Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers , 2018, Inf. Sci..
[50] Yong Wang,et al. Traceable Threshold Proxy Signature , 2017, J. Inf. Sci. Eng..
[51] Arun Kumar Sangaiah,et al. An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks , 2019, Sensors.
[52] Jin Wang,et al. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.
[53] Xuetao Wei,et al. Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications , 2019, IEEE Internet of Things Journal.
[54] Yan Zhang,et al. Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy , 2019, International Journal of Theoretical Physics.