Blockchain Based Credibility Verification Method for IoT Entities
暂无分享,去创建一个
Xiaoyu Hong | Jie Zhang | Ming Tao | Ruifen Yuan | Chao Qu | Ming Tao | Chao Qu | Xiaoyu Hong | Jie Zhang | Ruifen Yuan
[1] Zhuzhong Qian,et al. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..
[2] Jin Li,et al. Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..
[3] Fagui Liu,et al. Ontologies for the Transactions on IoT , 2015, Int. J. Distributed Sens. Networks.
[4] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[5] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[6] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[7] Xiaojun Zhang,et al. A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage , 2018, Secur. Commun. Networks.
[8] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[9] Mianxiong Dong,et al. Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes , 2017, Future Gener. Comput. Syst..
[10] Jian Shen,et al. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things , 2018, Secur. Commun. Networks.
[11] Yang Liu,et al. UAI-IOT Framework: A Method of Uniform Interfaces to Acquire Information from Heterogeneous Enterprise Information Systems , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[12] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..
[13] Ting Wu,et al. Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..
[14] Wenbin Chen,et al. Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..
[15] Jian Shen,et al. Secure data uploading scheme for a smart home system , 2018, Inf. Sci..
[16] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[17] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[18] Jian Shen,et al. A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.
[19] Dongqing Xie,et al. Social influence modeling using information theory in mobile social networks , 2017, Inf. Sci..
[20] Siobhán Clarke,et al. Smart management of next generation bike sharing systems using Internet of Things , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).
[21] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[22] Jing Chen,et al. Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[23] Jing Chen,et al. Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks , 2017, IEEE Transactions on Mobile Computing.
[24] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[25] Jong Hyuk Park,et al. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.
[26] Jin Li,et al. Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..
[27] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[28] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[29] Francesco Palmieri,et al. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..
[30] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[31] Mianxiong Dong,et al. Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach , 2018, IEEE Transactions on Industrial Informatics.
[32] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[33] Arun Kumar Sangaiah,et al. Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT , 2018, IEEE Access.
[34] Guoliang Xue,et al. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2016, IEEE Transactions on Computers.
[35] Qing Wang,et al. Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..
[36] Fagui Liu,et al. An OWL-S based specification model of dynamic entity services for Internet of Things , 2016, J. Ambient Intell. Humaniz. Comput..
[37] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[38] Jie Wu,et al. Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.
[39] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[40] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[41] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[42] Jin Li,et al. Privacy-preserving machine learning with multiple data providers , 2018, Future Gener. Comput. Syst..