相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue
Zhou Su et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
Xinyu Meng et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Key Management Scheme for Secure Channel Establishment in Fog Computing
Lei Zhang
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
Sidechain technologies in blockchain networks: An examination and state-of-the-art review
Amritraj Singh et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home
Zhigang Huang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Bitcoin and Blockchain: Security and Privacy
Ehab Zaghloul et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
Mohamed Amine Ferrag et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Blockchain based secure data sharing system for Internet of vehicles: A position paper
Lei Zhang et al.
VEHICULAR COMMUNICATIONS (2019)
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
Hu Xiong et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
Zhitao Guan et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
An Analysis into the Scalability of Bitcoin and Ethereum
Richard Dennis et al.
THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (2019)
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
S. K. Hafizul Islam et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies
Huseyin Ugur Yildiz et al.
AD HOC NETWORKS (2016)
Towards collusion-attack-resilient group key management using one-way function tree
Yanming Sun et al.
COMPUTER NETWORKS (2016)
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Qianhong Wu et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Group Key Agreement with Local Connectivity
Shaoquan Jiang
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
Threshold Anonymous Announcement in VANETs
Liqun Chen et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)