相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。SoK: DAG-based Blockchain Systems
Qin Wang et al.
ACM COMPUTING SURVEYS (2023)
Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications
Isaac Sheff et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2023)
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage
Reyhaneh Rabaninejad et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
A distributed dynamic authorisation method for Internet plus medical & healthcare data access based on consortium blockchain
Boyi Xu et al.
ENTERPRISE INFORMATION SYSTEMS (2022)
Blockchain-Enabled Tripartite Anonymous Identification Trusted Service Provisioning in Industrial IoT
Hui Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure
Wattana Viriyasitavat et al.
ENTERPRISE INFORMATION SYSTEMS (2022)
Achieving Scalability and Load Balance across Blockchain Shards for State Sharding
Canlin Li et al.
2022 41ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2022) (2022)
Collusion-resistant protocols for private processing of aggregated queries in distributed databases
Leanne Rylands et al.
DISTRIBUTED AND PARALLEL DATABASES (2021)
Privacy-preserving quality prediction for edge-based IoT services
Yiwen Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Yuting Li et al.
IEEE SYSTEMS JOURNAL (2021)
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
Sudha Anbalagan et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Exploring the intellectual cores of the blockchain-Internet of Things (BIoT)
Y. P. Tsang et al.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2021)
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
Xiaoying Jia et al.
IEEE SYSTEMS JOURNAL (2020)
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
Jing Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes
Chao Lin et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks
Jing Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Two-Factor Authentication for IoT With Location Information
Muhammad Naveed Aman et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Optimizing Bloom Filter: Challenges, Solutions, and Comparisons
Lailong Luo et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Device-Enhanced MEC: Multi-Access Edge Computing (MEC) Aided by End Device Computation and Caching: A Survey
Mahshid Mehrabi et al.
IEEE ACCESS (2019)
Design and Implementation of a Convolutional Neural Network on an Edge Computing Smartphone for Human Activity Recognition
Tahmina Zebin et al.
IEEE ACCESS (2019)
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija et al.
IEEE ACCESS (2019)
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
Mohamed Tahar Hammi et al.
COMPUTERS & SECURITY (2018)
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Survey on Multi-Access Edge Computing for Internet of Things Realization
Pawani Porambage et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Consolidate IoT Edge Computing with Lightweight Virtualization
Roberto Morabito et al.
IEEE NETWORK (2018)
Mobile Edge Computing: A Survey
Nasir Abbas et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Internet of things: Survey on security
Diego Mendez Mena et al.
INFORMATION SECURITY JOURNAL (2018)
EdgeIoT: Mobile Edge Computing for the Internet of Things
Xiang Sun et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications
Xi-Jun Lin et al.
COMPUTERS & SECURITY (2015)
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
Daojing He et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
A Scalable Robust Authentication Protocol for Secure Vehicular Communications
Lei Zhang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2010)