Secure Cyber-Physical Object Identification in Industrial IoT-Systems
暂无分享,去创建一个
Rüdiger Weißbach | Volker Skwarek | Kai Hendrik Wöhnert | Sven-Jannik Wöhnert | Tobias Thiel | V. Skwarek | Rüdiger Weißbach | Sven-Jannik Wöhnert | Tobias Thiel
[1] Qiang Liu,et al. ManuChain: Combining Permissioned Blockchain With a Holistic Optimization Model as Bi-Level Intelligence for Smart Manufacturing , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[2] Fei Tao,et al. Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.
[3] Ronald V. Kalafsky,et al. Geographies of production in 3D: Theoretical and research implications stemming from additive manufacturing , 2015 .
[4] Volker Skwarek,et al. Blockchains as security-enabler for industrial IoT-applications , 2017 .
[5] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[6] Morteza Ghobakhloo,et al. The future of manufacturing industry: a strategic roadmap toward Industry 4.0 , 2018, Journal of Manufacturing Technology Management.
[7] K. Blind,et al. The Impact of Product Piracy on Corporate IP Strategy , 2016 .
[8] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[9] Rodrigo Franco Gonçalves,et al. Blockchain in manufacturing revolution based on machine to machine transaction: a systematic review , 2019, Brazilian Journal of Operations & Production Management.
[10] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[11] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[12] Jiafu Wan,et al. Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.
[13] Eli Ben-Sasson,et al. Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..
[14] Pandian Vasant,et al. Industry 4.0 framework for management and operations: a review , 2017, Journal of Ambient Intelligence and Humanized Computing.
[15] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[16] Günther Schuh,et al. Highly Iterative Product Development Process for Engineering Projects , 2015 .
[17] E. Abele,et al. Challenges for Future Production/Manufacturing , 2018, Learning Factories.
[18] Zhuming Bi,et al. New Blockchain-Based Architecture for Service Interoperations in Internet of Things , 2019, IEEE Transactions on Computational Social Systems.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.