期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A survey on the adoption of blockchain in IoT:challenges and solutions 被引量:7
1
作者 Md Ashraf Uddin Andrew Stranieri +1 位作者 Iqbal Gondal Venki Balasubramanian 《Blockchain(Research and Applications)》 2021年第2期1-49,共49页
Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud se... Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud servers,single points of failure,a bottleneck in data flows and difficulties in regularly updating firmware for millions of smart devices from a point of security and maintenance perspective.Blockchain technologies avoid trusted third parties and safeguard against a single point of failure and other issues.This has inspired researchers to investigate blockchain’s adoption into IoT ecosystem.In this paper,recent state-of-the-arts advances in blockchain for IoT,blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth,smart cities,intelligent transport and other applications are analyzed.Obstacles,research gaps and potential solutions are also presented. 展开更多
关键词 Blockchain technology Consensus mechanism Blockchain cryptographic primitives healthcare Patient monitoring Cloud of Things Internet of Things Fog of Things Software defined network Blockchain applications
原文传递
A secure threshold Paillier proxy signature scheme 被引量:2
2
作者 Pei-yih TING Chia-huei HSEU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第3期206-213,共8页
As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a... As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols. 展开更多
关键词 Paillier proxy signature Threshold scheme Secure multi-party protocols cryptographic primitives
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部