A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain
暂无分享,去创建一个
Yong-Yuan Deng | Hsien-Chou Liao | Zi-Yi Lim | Chin-Ling Chen | Chin-Ling Chen | Hsien-Chou Liao | Yong-Yuan Deng | Zi-Yi Lim
[1] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[2] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[3] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[4] Huaping Liu,et al. Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme , 2019, IEEE Access.
[5] Paul E. Baclace. Competitive agents for information filtering , 1992, CACM.
[6] Zhen Wang,et al. Blockchain for digital rights management , 2018, Future Gener. Comput. Syst..
[7] A. Khatoon. A Blockchain-Based Smart Contract System for Healthcare Management , 2020, Electronics.
[8] Richard Evans,et al. Blockchain-based electronic healthcare record system for healthcare 4.0 applications , 2020, J. Inf. Secur. Appl..
[9] Debiao He,et al. DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain , 2020, IEEE Transactions on Information Forensics and Security.
[10] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[11] Neo C.K. Yiu,et al. An Empirical Analysis of Implementing Enterprise Blockchain Protocols in Supply Chain Anti-Counterfeiting and Traceability , 2021, ArXiv.
[12] Yong Yu,et al. Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.
[13] Eoghan Casey,et al. IoT forensic challenges and opportunities for digital traces , 2019, Digit. Investig..
[14] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[15] Shailesh Kumar,et al. 5G: a new era of wireless communication , 2020 .
[16] Issa Traore,et al. Secure remote anonymous user authentication scheme for smart home environment , 2020, Internet Things.
[17] Hong Jiang,et al. Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.
[18] Thar Baker,et al. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems , 2020, Inf. Process. Manag..
[19] Mouzhi Ge,et al. Blockchain-Based Access Control for IoT in Smart Home Systems , 2020, DEXA.
[20] Sean Smith,et al. Central Alarm Stations and Dispatch Operations , 2010 .
[21] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[22] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[23] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[24] Rajeev Kumar,et al. Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records , 2020, IEEE Access.
[25] Aruna Seneviratne,et al. A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.
[26] Mahesh K. Nalla,et al. Have the standards for private security guards become more stringent in the post 9/11 era? An assessment of security guard regulations in the US from 1982 to 2010 , 2017 .
[27] Dezhi Han,et al. Fabric-iot: A Blockchain-Based Access Control System in IoT , 2020, IEEE Access.
[28] Moayad Aloqaily,et al. An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..
[29] Md. Zakirul Alam Bhuiyan,et al. CRAB: Blockchain Based Criminal Record Management System , 2018, SpaCCS.
[30] Feroz Ahmad,et al. Bitcoin: Digital Decentralized Cryptocurrency , 2018 .
[31] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.