标题
Blockchain Based Credibility Verification Method for IoT Entities
作者
关键词
-
出版物
Security and Communication Networks
Volume 2018, Issue -, Pages 1-11
出版商
Hindawi Limited
发表日期
2018-06-28
DOI
10.1155/2018/7817614
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Privacy-preserving machine learning with multiple data providers
- (2018) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes
- (2018) Ming Tao et al. Future Generation Computer Systems-The International Journal of eScience
- Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach
- (2018) Ming Tao et al. IEEE Transactions on Industrial Informatics
- Significant Permission Identification for Machine-Learning-Based Android Malware Detection
- (2018) Jin Li et al. IEEE Transactions on Industrial Informatics
- Differentially private Naive Bayes learning over multiple data sources
- (2018) Tong Li et al. INFORMATION SCIENCES
- Generating stable biometric keys for flexible cloud computing authentication using finger vein
- (2018) Zhendong Wu et al. INFORMATION SCIENCES
- Secure data uploading scheme for a smart home system
- (2018) Jian Shen et al. INFORMATION SCIENCES
- Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
- (2018) Chong-zhi Gao et al. INFORMATION SCIENCES
- Multi-authority fine-grained access control with accountability and its application in cloud
- (2018) Jin Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Distance metric optimization driven convolutional neural network for age invariant face recognition
- (2018) Ya Li et al. PATTERN RECOGNITION
- A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
- (2018) Run Xie et al. Security and Communication Networks
- A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
- (2018) Chen Wang et al. Security and Communication Networks
- A Short Linearly Homomorphic Proxy Signature Scheme
- (2018) Qun Lin et al. IEEE Access
- Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT
- (2018) Rutvij H. Jhaveri et al. IEEE Access
- An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
- (2018) Qun Lin et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes
- (2017) Ming Tao et al. Future Generation Computer Systems-The International Journal of eScience
- Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks
- (2017) Jing Chen et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels
- (2017) Lisheng Fan et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Social influence modeling using information theory in mobile social networks
- (2017) Sancheng Peng et al. INFORMATION SCIENCES
- Insight of the protection for data security under selective opening attacks
- (2017) Zhengan Huang et al. INFORMATION SCIENCES
- Effective Query Grouping Strategy in Clouds
- (2017) Qin Liu et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions
- (2017) Jin Park et al. Symmetry-Basel
- Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference
- (2016) Lisheng Fan et al. IEEE Journal of Selected Topics in Signal Processing
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
- (2016) Kun He et al. IEEE TRANSACTIONS ON COMPUTERS
- FairAccess: a new Blockchain-based access control framework for the Internet of Things
- (2016) Aafaf Ouaddah et al. Security and Communication Networks
- Lattice-based linearly homomorphic signatures in the standard model
- (2016) Wenbin Chen et al. THEORETICAL COMPUTER SCIENCE
- The IoT electric business model: Using blockchain technology for the internet of things
- (2016) Yu Zhang et al. Peer-to-Peer Networking and Applications
- Blockchains and Smart Contracts for the Internet of Things
- (2016) Konstantinos Christidis et al. IEEE Access
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks
- (2015) Jing Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An OWL-S based specification model of dynamic entity services for Internet of Things
- (2015) Chao Qu et al. Journal of Ambient Intelligence and Humanized Computing
- Ontologies for the Transactions on IoT
- (2015) Chao Qu et al. International Journal of Distributed Sensor Networks
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started