相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Engineering, Multidisciplinary
Liang Tan et al.
Summary: This paper proposes a blockchain-empowered security and privacy protection scheme for COVID-19 medical records, using ciphertext policy attribute-based encryption and uniform identity authentication to ensure security and privacy. With this scheme, medical institutions and users can safely and effectively manage and share COVID-19 electronic medical records.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Information Systems
Wei Liang et al.
Summary: The Industrial Internet of Things (IIoT) aims to improve economic benefits by optimizing process controls, but the use of Radio Frequency Identification (RFID) technology in IIoT raises concerns about security and cost. To address these issues, a mutual authentication scheme incorporating Deep Learning techniques is proposed for secure access authentication of IC circuits on the IoT.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2022)
Article
Automation & Control Systems
Dezhi Han et al.
Summary: This article proposes an auditable access control model based on attribute-based access control for managing private data's access control policy in IoT environments. A blockchain-based auditable access control system is also introduced to ensure data security and auditable access in IoT environments. Experimental results demonstrate high throughput and data security for real application scenarios.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Wei Liang et al.
Summary: This article proposes a collaborative clustering-characteristic-based data fusion approach for intrusion detection in a Blockchain-based system. By using mathematical and AI models to train and analyze data, it accurately detects abnormal intrusion behavior.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Fengqi Li et al.
Summary: This paper proposes a blockchain-based EHR system to solve the problems of secure storage, reliable sharing, access control, and privacy protection in the medical industry. The system achieves high performance by designing a medical record storage scheme, improving cryptographic primitives, and applying an additive homomorphic cryptosystem.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Wei Liang et al.
Summary: Cyber-physical systems (CPSs) are secure real-time embedded systems that integrate physical and information worlds through high-speed real-time transmission. This study proposes a security collaborative filtering recommendation algorithm based on artificial intelligence to capture complex interaction information and accurately predict rating information.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Cheng Zhang et al.
Summary: This article introduces a blockchain-based multi-cloud storage data auditing scheme to ensure data integrity and resolve service disputes. The scheme utilizes blockchain to record interactions between users, service providers, and organizers as evidence, and employs smart contracts to identify malicious service providers. Theoretical analysis and experiments demonstrate the effectiveness and acceptable cost of the scheme in multi-cloud environments.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Computer Science, Artificial Intelligence
Jaya Rao Gudeme et al.
Summary: The paper proposes an attribute-based public auditing scheme for shared data in cloud storage, where users can sign data blocks over a set of attributes without revealing any identity information, and a unique public key is used to verify integrity. The scheme also achieves user revocation through proxy re-signatures.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2021)
Article
Telecommunications
Wei Liang et al.
Summary: The study proposes an anonymous privacy data protection and access control scheme based on ECC and bilinear pairing to ensure the security of MEC communication, with freshness guaranteed by timestamps and random numbers, effectively reducing costs.
CHINA COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Xiaoqiong Xu et al.
Summary: Latency performance is crucial in assessing the effectiveness of Fabric blockchain, with many empirical studies analyzing this performance based on different hardware platforms.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Article
Computer Science, Theory & Methods
Zhitao Guan et al.
Summary: With the arrival of the Industry 4.0 era, the development of smart cities based on the Internet of Things has reached a new level, with a focus on the security of wireless sensor networks. The Energy Internet, a key component supporting smart city construction, is increasingly emphasizing security and reliability, particularly in the use of blockchain technology for energy trading. However, privacy disclosure remains a challenge for many blockchain-based trading models, leading to the introduction of Ciphertext-Policy Attribute-Based Encryption as a core algorithm to address this issue.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Shunli Ma et al.
Summary: The study introduces an abstract framework of a decentralized smart contract system with balance and transaction amount hiding property over an account-model blockchain. A homomorphic public-key encryption scheme is used to build a concrete system with such properties and a highly efficient non-interactive zero knowledge (NIZK) argument is constructed based on the encryption scheme to ensure the validity of transactions. The proposed NIZK argument significantly improves the time efficiency in generating a proof compared to previous similar constructions, albeit at the expense of a relatively longer proof size.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Information Systems
Hongmin Gao et al.
Summary: Privacy protection and open sharing are essential in data governance in the AI-driven era. The BSSPD scheme combines blockchain, CP-ABE, and IPFS technologies to achieve secure sharing of personal data, allowing data owners to have fine-grained access control over their data.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Chunhui Piao et al.
Summary: Sharing government data in blockchain systems is important for social development, but privacy breaches must be addressed. The Service-On-Chain (SOC) approach uses smart contracts to ensure data sharing trustworthiness and controllability among government departments.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
DaeGeun Yoon et al.
Summary: With the rise of artificial intelligence, the demand for personal data has increased, leading to companies collecting and utilizing user data. A proposed blockchain-based personal data trading system aims to provide users with decentralized means of authentication and ownership proof, reducing reliance on centralized service providers. Through the use of Decentralized Identifiers (DID) and Verifiable Credentials (VC), users are able to securely trade personal data without the need for intermediaries.
12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION
(2021)
Proceedings Paper
Computer Science, Information Systems
Benedikt Bunz et al.
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020
(2020)
Proceedings Paper
Engineering, Electrical & Electronic
Siva Rama Krishnan Somayaji et al.
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS)
(2020)
Proceedings Paper
Computer Science, Information Systems
Janis Grabis et al.
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW 2020)
(2020)
Article
Computer Science, Hardware & Architecture
Voundi Koe Arthur Sandor et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2019)
Article
Computer Science, Information Systems
Shangping Wang et al.
Proceedings Paper
Computer Science, Information Systems
Elli Androulaki et al.
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE
(2018)
Proceedings Paper
Computer Science, Information Systems
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS
(2007)