Secure access control for manufacturing sector with application of ethereum blockchain
出版年份 2021 全文链接
标题
Secure access control for manufacturing sector with application of ethereum blockchain
作者
关键词
-
出版物
Peer-to-Peer Networking and Applications
Volume -, Issue -, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2021-05-07
DOI
10.1007/s12083-021-01108-3
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Multilabel classification of remote sensed satellite imagery
- (2020) Ajay Kumar et al. Transactions on Emerging Telecommunications Technologies
- Secure smart contracts for cloud‐based manufacturing using Ethereum blockchain
- (2020) Ajay Kumar et al. Transactions on Emerging Telecommunications Technologies
- Supervised learning model for identifying illegal activities in Bitcoin
- (2020) Pranav Nerurkar et al. APPLIED INTELLIGENCE
- Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction
- (2020) Ajay Kumar et al. Transactions on Emerging Telecommunications Technologies
- Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)
- (2020) Pranav Nerurkar et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Efficient and Privacy-Preserving Medical Research Support Platform Against COVID-19: A Blockchain-Based Approach
- (2020) Keping Yu et al. IEEE Consumer Electronics Magazine
- Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System
- (2020) Keping Yu et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications
- (2020) Zhiwei Guo et al. IEEE Internet of Things Journal
- Notes on “Secure authentication scheme for IoT and cloud servers”
- (2017) Chin-Chen Chang et al. Pervasive and Mobile Computing
- Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT
- (2017) Zahid Mahmood et al. Applied Sciences-Basel
- Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
- (2017) Sandip Roy et al. IEEE Internet of Things Journal
- A Survey on Security and Privacy Issues in Internet-of-Things
- (2017) Yuchen Yang et al. IEEE Internet of Things Journal
- An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
- (2016) Mohammad Sabzinejad Farash et al. Ad Hoc Networks
- A robust ElGamal-based password-authentication protocol using smart card for client-server communication
- (2016) Tanmoy Maitra et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A lightweight authentication and key agreement protocol preserving user anonymity
- (2016) Morteza Nikooghadam et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A lightweight attribute-based encryption scheme for the Internet of Things
- (2015) Xuanxia Yao et al. Future Generation Computer Systems-The International Journal of eScience
- A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
- (2015) Xiong Li et al. Security and Communication Networks
- An enhanced privacy preserving remote user authentication scheme with provable security
- (2015) Shehzad Ashraf Chaudhry et al. Security and Communication Networks
- Secure authentication scheme for IoT and cloud servers
- (2015) Sheetal Kalra et al. Pervasive and Mobile Computing
- An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
- (2015) Debiao He et al. IEEE Internet of Things Journal
- A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
- (2014) Muhamed Turkanović et al. Ad Hoc Networks
- An improved remote user authentication scheme with key agreement
- (2014) Saru Kumari et al. COMPUTERS & ELECTRICAL ENGINEERING
- A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
- (2013) Yi-Pin Liao et al. Ad Hoc Networks
- A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
- (2013) Kaiping Xue et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
- (2011) He Debiao et al. Information Fusion
- A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- (2011) SK Hafizul Islam et al. JOURNAL OF SYSTEMS AND SOFTWARE
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started