标题
DecChain: A decentralized security approach in Edge Computing based on Blockchain
作者
关键词
Blockchain, Edge computing, Security, Scalability, Authentication, Decentralized
出版物
Future Generation Computer Systems-The International Journal of eScience
Volume 113, Issue -, Pages 363-379
出版商
Elsevier BV
发表日期
2020-07-10
DOI
10.1016/j.future.2020.07.009
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- On blockchain and its integration with IoT. Challenges and opportunities
- (2018) Ana Reyna et al. Future Generation Computer Systems-The International Journal of eScience
- Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
- (2017) Vanga Odelu et al. Future Generation Computer Systems-The International Journal of eScience
- Can Blockchain Strengthen the Internet of Things?
- (2017) Nir Kshetri IT Professional
- Post-cloud computing paradigms: a survey and comparison
- (2017) Yuezhi Zhou et al. TSINGHUA SCIENCE AND TECHNOLOGY
- A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
- (2016) Ruhul Amin et al. Security and Communication Networks
- Blockchains and Smart Contracts for the Internet of Things
- (2016) Konstantinos Christidis et al. IEEE Access
- Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery
- (2015) SK Hafizul Islam et al. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
- A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
- (2015) Jia-Lun Tsai et al. IEEE Systems Journal
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- (2015) Qi Jiang et al. NONLINEAR DYNAMICS
- Finding your Way in the Fog
- (2014) Luis M. Vaquero et al. ACM SIGCOMM Computer Communication Review
- A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges
- (2014) Yating Wang et al. WIRELESS PERSONAL COMMUNICATIONS
- Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
- (2013) Hyo Jin Jo et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
- (2012) Alessandro Armando et al. COMPUTERS & SECURITY
- A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
- (2010) Xinyi Huang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started