4.6 Article

BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

Basudeb Bera et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications

Munmun Bhattacharya et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server

Zhibo Wang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2019)

Article Computer Science, Theory & Methods

Lightweight IoT-based authentication scheme in cloud computing circumstance

Lu Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

Jiaqing Mo et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Software Engineering

A lightweight anonymous mutual authentication and key agreement scheme for WBAN

Zisang Xu et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Theory & Methods

A blockchain-based location privacy-preserving crowdsensing system

Mengmeng Yang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Hardware & Architecture

Security and privacy preservation in fog-based crowd sensing on the interne of vehicles

Gang Sun et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

ACDAS: Authenticated controlled data access and sharing scheme for cloud storage

Deepnarayan Tiwari et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

Kisung Park et al.

IEEE ACCESS (2019)

Article Telecommunications

Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing

Vireshwar Kumar et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2019)

Article Computer Science, Information Systems

IoMT Malware Detection Approaches: Analysis and Research Challenges

Mohammad Wazid et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology

Xiaoliang Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Cybernetics

A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment

Xiaolong Xu et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)

Article Computer Science, Information Systems

Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid

Mochan Fan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks

Wenbo Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications

Jingzhong Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Zipf's Law in Passwords

Ding Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Privacy-Preserving Verifiable Set Operation in Big Data for Cloud-Assisted Mobile Crowdsourcing

Gaoqiang Zhuo et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Engineering, Electrical & Electronic

Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities

Kan Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)