LNGate$^{2}$ 2 : Secure Bidirectional IoT Micro-Payments Using Bitcoin's Lightni
暂无分享,去创建一个
[1] Anastasios Sidiropoulos,et al. Mass Exit Attacks on the Lightning Network , 2022, 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[2] Pallipamu Venkateswara Rao,et al. A secure IoT-based micro-payment protocol for wearable devices , 2022, Peer-to-Peer Networking and Applications.
[3] Maria Potop-Butucaru,et al. Securing Wireless Payment-Channel Networks With Minimum Lock Time Windows , 2021, ICC 2022 - IEEE International Conference on Communications.
[4] Chi Zhang,et al. HyperChannel: A Secure Layer-2 Payment Network for Large-Scale IoT Ecosystem , 2021, ICC 2021 - IEEE International Conference on Communications.
[5] Kemal Akkaya,et al. LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography , 2021, WISEC.
[6] Kemal Akkaya,et al. Cryptocurrency Solutions to Enable Micropayments in Consumer IoT , 2021, IEEE Consumer Electronics Magazine.
[7] Magnus Almgren,et al. TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).
[8] Sylvain Kubler,et al. Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems , 2020, Future Gener. Comput. Syst..
[9] Antonio Puliafito,et al. P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release , 2020, Sensors.
[10] Aviv Zohar,et al. Congestion Attacks in Payment Channel Networks , 2020, Financial Cryptography.
[11] A. Uluagac,et al. LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network , 2019, ESORICS.
[12] Hector Marco-Gisbert,et al. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.
[13] Aziz Mohaisen,et al. Overview of Attack Surfaces in Blockchain , 2019, Blockchain for Distributed Systems Security.
[14] Tilman Wolf,et al. A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[15] Konstantin Mikhaylov,et al. Experimental Performance Evaluation of BLE 4 Versus BLE 5 in Indoors and Outdoors Scenarios , 2018, Advances in Body Area Networks I.
[16] Dong Jin,et al. Bitcoin Payment-Channels for Resource Limited IoT Devices , 2018, COINS.
[17] Yehuda Lindell,et al. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody , 2018, CCS.
[18] Anamika Chauhan,et al. Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[19] Massimo Bartoletti,et al. SoK: unraveling Bitcoin smart contracts , 2018, IACR Cryptol. ePrint Arch..
[20] Yehuda Lindell,et al. Fast Secure Two-Party ECDSA Signing , 2017, Journal of Cryptology.
[21] Zlatko Bundalo,et al. Vehicle toll payment system based on Internet of Things concept , 2016, 2016 5th Mediterranean Conference on Embedded Computing (MECO).
[22] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[23] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[24] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[25] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[26] Akira Matsumoto,et al. Performance evaluation of IEEE 802.11n devices for vehicular networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[27] John. Moore,et al. Subgame Perfect Implementation , 1988 .
[28] E. Damme. Refinements of the Nash Equilibrium Concept , 1983 .
[29] Adi Shamir,et al. How to share a secret , 1979, CACM.
[30] R. Myerson. Refinements of the Nash equilibrium concept , 1978 .
[31] Yi Wang,et al. Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach , 2021, IEEE Access.
[32] Yong Feng,et al. A Data Trading Scheme Based on Payment Channel Network for Internet of Things , 2020, BlockSys.
[33] Yanchun Zhang,et al. Untraceable Electronic Cash System in the Internet of Things , 2020 .
[34] Kent E. Seamons,et al. A Usability Study of Five Two-Factor Authentication Methods , 2019, SOUPS @ USENIX Security Symposium.
[35] Sharon Goldberg,et al. Certifying RSA Public Keys with an Efficient NIZK , 2018, IACR Cryptol. ePrint Arch..
[36] Daniel Davis Wood. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[37] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[38] R. Aumann. Backward induction and common knowledge of rationality , 1995 .
[39] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..