Related references
Note: Only part of the references are listed.
Article
Computer Science, Hardware & Architecture
Yannan Li et al.
Summary: The article introduces a framework of a self-tallying voting system in decentralized IoT based on blockchain, addressing the fairness issues inherent in self-tallying voting systems and proving the security of the system. The implementation results demonstrate the practicability of the system.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Dun Li et al.
Summary: MOOCs have become a major online learning approach, and ensuring the security and privacy of ELRs is a critical issue. The proposed blockchain-based scheme provides efficient security assurance and outperforms similar works in terms of security and performance.
COMPUTER STANDARDS & INTERFACES
(2022)
Article
Computer Science, Hardware & Architecture
Liang Tan et al.
Summary: With the advancement of 5G technology, smart city services have become essential for modern city development. However, existing crowdsourcing systems pose security risks due to reliance on centralized payment institutions. To address this issue, a blockchain-empowered and decentralized trusted service mechanism has been proposed for 5G-enabled smart cities, showing effectiveness in experiments.
COMPUTER STANDARDS & INTERFACES
(2021)
Article
Computer Science, Hardware & Architecture
Xuran Li et al.
Summary: Security vulnerabilities are hindering the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond, due to stringent requirements of current security countermeasures based on cryptographic algorithms. In contrast, friendly jamming (FJ) as a physical layer security method shows promise in enhancing wireless communications security with less resource demand on end devices.
COMPUTER STANDARDS & INTERFACES
(2021)
Article
Computer Science, Hardware & Architecture
Yannan Li et al.
Summary: Monero offers high anonymity for users and transactions, but lacks user accountability, which is crucial to combat criminal activities in cryptocurrency transactions. This paper introduces Traceable Monero, a new cryptocurrency that aims to strike a balance between user anonymity and accountability. By overlaying Monero with tracing mechanisms, Traceable Monero ensures security without significantly impacting transaction efficiency.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Xu Ma et al.
Summary: The advancement of cloud services leads to more data owners storing their data on cloud databases, raising concerns about data privacy risks. This paper introduces a searchable encryption method with multiple keywords and presents a secure data sharing framework based on attribute-based encryption, searchable encryption, and blockchain. Experimental results demonstrate the practicality and efficiency of the proposed scheme.
COMPUTER STANDARDS & INTERFACES
(2021)
Article
Computer Science, Hardware & Architecture
Rajesh Gupta et al.
Summary: This article discusses the advantages of edge computing over cloud computing, as well as the innovative application of using 6G wireless networks to solve connectivity issues with 4G and 5G. Through a case study, it is demonstrated that 6G-based edge intelligence has lower latency compared to 4G and 5G communication networks.
COMPUTER STANDARDS & INTERFACES
(2021)
Article
Computer Science, Information Systems
Ruonan Chen et al.
IEEE INTERNET OF THINGS JOURNAL
(2020)
Article
Computer Science, Hardware & Architecture
Yannan Li et al.
Article
Computer Science, Theory & Methods
Tatsuaki Okamoto et al.
JOURNAL OF CRYPTOLOGY
(2019)
Article
Computer Science, Hardware & Architecture
Yong Yu et al.
IEEE WIRELESS COMMUNICATIONS
(2018)