Blockchain for Large-Scale Internet of Things Data Storage and Protection
暂无分享,去创建一个
Hong Li | Limin Sun | Xiuzhen Cheng | Bo Mei | Ruinian Li | Tian-Yi Song | Limin Sun | Xiuzhen Cheng | Hong Li | Tianyi Song | Ruinian Li | Bo Mei
[1] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[2] Guangyi Xiao,et al. Improving Multilingual Semantic Interoperation in Cross-Organizational Enterprise Systems Through Concept Disambiguation , 2012, IEEE Transactions on Industrial Informatics.
[3] Yan Liu,et al. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications , 2017, WASA.
[4] Colin Boyd,et al. Security-Mediated Certificateless Cryptography , 2006, Public Key Cryptography.
[5] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[6] Cristina Pérez-Solà,et al. Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions , 2016, MDAI.
[7] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[8] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[9] David R. Karger,et al. Koorde: A Simple Degree-Optimal Distributed Hash Table , 2003, IPTPS.
[10] Stefan Dziembowski,et al. Proofs of Space , 2015, CRYPTO.
[11] Lu Zhang,et al. An efficient and robust certificateless short signature scheme , 2013 .
[12] Larissa Lee,et al. New Kids on the Blockchain: How Bitcoin's Technology Could Reinvent the Stock Market , 2016 .
[13] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[14] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[15] Hairong Kuang,et al. The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[16] Sanjit Chatterjee,et al. Identity-based encryption , 2014 .
[17] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[20] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[21] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .
[22] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[23] Elisa Bertino,et al. An efficient certificateless cryptography scheme without pairing , 2013, CODASPY.
[24] Ethan Buchman,et al. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains , 2016 .
[25] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[26] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[27] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[28] Yang Liu,et al. A Storage Solution for Massive IoT Data Based on NoSQL , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[29] Daqiang Zhang,et al. Internet of Things , 2012, J. Univers. Comput. Sci..
[30] Hongming Cai,et al. An IoT-Oriented Data Storage Framework in Cloud Computing Platform , 2014, IEEE Transactions on Industrial Informatics.
[31] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[32] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[33] Fan Zhang,et al. REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..
[34] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[35] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[36] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[37] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[38] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[39] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[40] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[41] Peter Corcoran,et al. Mobile-Edge Computing and the Internet of Things for Consumers: Extending cloud computing and services to the edge of the network , 2016, IEEE Consumer Electronics Magazine.
[42] Arvind Narayanan,et al. Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security , 2016, ACNS.
[43] Emin Gün Sirer,et al. Short Paper: Service-Oriented Sharding for Blockchains , 2017, Financial Cryptography.
[44] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[45] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[46] Jiguo Yu,et al. IoT Applications on Secure Smart Shopping System , 2017, IEEE Internet of Things Journal.
[47] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[48] Ghassan O. Karame,et al. On the Security and Scalability of Bitcoin's Blockchain , 2016, CCS.
[49] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.