- Home
- Publications
- Publication Search
- Publication Details
Title
Blockchain Based Credibility Verification Method for IoT Entities
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 2018, Issue -, Pages 1-11
Publisher
Hindawi Limited
Online
2018-06-28
DOI
10.1155/2018/7817614
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Privacy-preserving machine learning with multiple data providers
- (2018) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes
- (2018) Ming Tao et al. Future Generation Computer Systems-The International Journal of eScience
- Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach
- (2018) Ming Tao et al. IEEE Transactions on Industrial Informatics
- Significant Permission Identification for Machine-Learning-Based Android Malware Detection
- (2018) Jin Li et al. IEEE Transactions on Industrial Informatics
- Differentially private Naive Bayes learning over multiple data sources
- (2018) Tong Li et al. INFORMATION SCIENCES
- Generating stable biometric keys for flexible cloud computing authentication using finger vein
- (2018) Zhendong Wu et al. INFORMATION SCIENCES
- Secure data uploading scheme for a smart home system
- (2018) Jian Shen et al. INFORMATION SCIENCES
- Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
- (2018) Chong-zhi Gao et al. INFORMATION SCIENCES
- Multi-authority fine-grained access control with accountability and its application in cloud
- (2018) Jin Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Distance metric optimization driven convolutional neural network for age invariant face recognition
- (2018) Ya Li et al. PATTERN RECOGNITION
- A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
- (2018) Run Xie et al. Security and Communication Networks
- A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
- (2018) Chen Wang et al. Security and Communication Networks
- A Short Linearly Homomorphic Proxy Signature Scheme
- (2018) Qun Lin et al. IEEE Access
- Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT
- (2018) Rutvij H. Jhaveri et al. IEEE Access
- An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
- (2018) Qun Lin et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes
- (2017) Ming Tao et al. Future Generation Computer Systems-The International Journal of eScience
- Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks
- (2017) Jing Chen et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels
- (2017) Lisheng Fan et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Social influence modeling using information theory in mobile social networks
- (2017) Sancheng Peng et al. INFORMATION SCIENCES
- Insight of the protection for data security under selective opening attacks
- (2017) Zhengan Huang et al. INFORMATION SCIENCES
- Effective Query Grouping Strategy in Clouds
- (2017) Qin Liu et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions
- (2017) Jin Park et al. Symmetry-Basel
- Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference
- (2016) Lisheng Fan et al. IEEE Journal of Selected Topics in Signal Processing
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
- (2016) Kun He et al. IEEE TRANSACTIONS ON COMPUTERS
- FairAccess: a new Blockchain-based access control framework for the Internet of Things
- (2016) Aafaf Ouaddah et al. Security and Communication Networks
- Lattice-based linearly homomorphic signatures in the standard model
- (2016) Wenbin Chen et al. THEORETICAL COMPUTER SCIENCE
- The IoT electric business model: Using blockchain technology for the internet of things
- (2016) Yu Zhang et al. Peer-to-Peer Networking and Applications
- Blockchains and Smart Contracts for the Internet of Things
- (2016) Konstantinos Christidis et al. IEEE Access
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks
- (2015) Jing Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An OWL-S based specification model of dynamic entity services for Internet of Things
- (2015) Chao Qu et al. Journal of Ambient Intelligence and Humanized Computing
- Ontologies for the Transactions on IoT
- (2015) Chao Qu et al. International Journal of Distributed Sensor Networks
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now