4.6 Article

Enabling privacy and leakage resistance for dynamic blockchain-based access control systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT

Yannan Li et al.

Summary: The article introduces a framework of a self-tallying voting system in decentralized IoT based on blockchain, addressing the fairness issues inherent in self-tallying voting systems and proving the security of the system. The implementation results demonstrate the practicability of the system.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning

Dun Li et al.

Summary: MOOCs have become a major online learning approach, and ensuring the security and privacy of ELRs is a critical issue. The proposed blockchain-based scheme provides efficient security assurance and outperforms similar works in terms of security and performance.

COMPUTER STANDARDS & INTERFACES (2022)

Article Computer Science, Hardware & Architecture

A blockchain-empowered crowdsourcing system for 5G-enabled smart cities *

Liang Tan et al.

Summary: With the advancement of 5G technology, smart city services have become essential for modern city development. However, existing crowdsourcing systems pose security risks due to reliance on centralized payment institutions. To address this issue, a blockchain-empowered and decentralized trusted service mechanism has been proposed for 5G-enabled smart cities, showing effectiveness in experiments.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Hardware & Architecture

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

Xuran Li et al.

Summary: Security vulnerabilities are hindering the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond, due to stringent requirements of current security countermeasures based on cryptographic algorithms. In contrast, friendly jamming (FJ) as a physical layer security method shows promise in enhancing wireless communications security with less resource demand on end devices.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Hardware & Architecture

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability

Yannan Li et al.

Summary: Monero offers high anonymity for users and transactions, but lacks user accountability, which is crucial to combat criminal activities in cryptocurrency transactions. This paper introduces Traceable Monero, a new cryptocurrency that aims to strike a balance between user anonymity and accountability. By overlaying Monero with tracing mechanisms, Traceable Monero ensures security without significantly impacting transaction efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Trusted data sharing with flexible access control based on blockchain

Xu Ma et al.

Summary: The advancement of cloud services leads to more data owners storing their data on cloud databases, raising concerns about data privacy risks. This paper introduces a searchable encryption method with multiple keywords and presents a secure data sharing framework based on attribute-based encryption, searchable encryption, and blockchain. Experimental results demonstrate the practicality and efficiency of the proposed scheme.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Hardware & Architecture

6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission

Rajesh Gupta et al.

Summary: This article discusses the advantages of edge computing over cloud computing, as well as the innovative application of using 6G wireless networks to solve connectivity issues with 4G and 5G. Through a case study, it is demonstrated that 6G-based edge intelligence has lower latency compared to 4G and 5G communication networks.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Information Systems

Blockchain-Based Dynamic Provable Data Possession for Smart Cities

Ruonan Chen et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies

Yannan Li et al.

IEEE NETWORK (2019)

Article Computer Science, Theory & Methods

Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption

Tatsuaki Okamoto et al.

JOURNAL OF CRYPTOLOGY (2019)

Article Computer Science, Hardware & Architecture

BLOCKCHAIN-BASED SOLUTIONS TO SECURITY AND PRIVACY ISSUES IN THE INTERNET OF THINGS

Yong Yu et al.

IEEE WIRELESS COMMUNICATIONS (2018)