4.8 Article

Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network

Muhammad Ajmal Azad et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Federated Deep Reinforcement Learning for Internet of Things With Decentralized Cooperative Edge Caching

Xiaofei Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Blockchain-Based Decentralized Trust Management in Vehicular Networks

Zhe Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning

Xiaofei Wang et al.

IEEE NETWORK (2019)

Proceedings Paper Computer Science, Information Systems

Multi-Factor Authentication Modeling

Libor Dostalek

2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019) (2019)

Proceedings Paper Computer Science, Cybernetics

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems

Deepak Puthal et al.

2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE) (2019)

Article Computer Science, Information Systems

Blockchain-based decentralized content trust for docker images

Quanqing Xu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Untangling Blockchain: A Data Processing View of Blockchain Systems

Tien Tuan Anh Dinh et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)

Article Computer Science, Information Systems

Blockchain Access Privacy: Challenges and Directions

Ryan Henry et al.

IEEE SECURITY & PRIVACY (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Blockchain-based System for Secure Data Storage with Private Keyword Search

Hoang Giang Do et al.

2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES) (2017)

Article Computer Science, Hardware & Architecture

Blockchain Technologies: The Foreseeable Impact on Society and Industry

Tomaso Aste et al.

COMPUTER (2017)

Article Computer Science, Information Systems

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

Shuo Chen et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Jia-Lun Tsai et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Information Systems

A security authentication scheme in machine-to-machine home network service

Xuebin Sun et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Theory & Methods

Practical byzantine fault tolerance and proactive recovery

M Castro et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)