Smart City Infrastructure. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Smart City Infrastructure - Группа авторов страница 18

Название: Smart City Infrastructure

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119785545

isbn:

СКАЧАТЬ K. and Muthu kumarasamy, V., securing smart cities using blockchain technology, in: 2016 IEEE 18th International Conference on High Performance Computing and Communications, pp. 1392–1393, 2016.

      17. Dalipi, F. and Yayilgan, S.Y., Security and privacy considerations for iot application on smart grids: Survey and research challenges, in: Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016, pp. 63–68, 2016.

      18. Laszka, A., Dubey, A., Walker, M., Schmidt, D., providing privacy, safety, and security in iot-based transactive energy systems using distributed ledgers, in: Proceedings of the Seventh International Conference on the Internet of Things, ACM, p. 13, 2017.

      19. Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., Sassone, V., A blockchain-based infrastructure for reliable and cost-effective iotaided smart grids, in: Living in the Internet of Things: Cybersecurity of the IoT-2018, pp. 1–6, 2018.

      20. Mylrea, M. and Gourisetti, S.N.G., Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security, in: Resilience Week (RWS), 2017, IEEE, pp. 18–23, 2017.

      21. Kalkan, K. and Zeadally, S., Securing internet of things (iot) with software defined networking (sdn). IEEE Commun. Mag., 56, 9, 186–192, 2017.

      22. Ziegeldorf, J.H., Matzutt, R., Henze, M., Grossmann, F., Wehrle, K., Secure and anonymous decentralized Bitcoin mixing. Futur. Gener. Comput. Syst., 80, 448–466, Mar 2018.

      24. ElGamal, T., A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, in: Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, Blakley, G.R., Chaum, D. (Eds), Springer, Berlin, Heidelberg, vol. 196, pp. 10–18, 1985.

      25. Gai, F., Wang, B., Deng, W., Peng, W., Proof of reputation: A reputation-based consensus protocol for peer-to-peer network, in: Database Systems for Advanced Applications, pp. 666–681, 2018.

      26. Garay, J., Kiayias, A., Leonardos, N., The Bitcoin backbone protocol: Analysis and applications, in: EUROCRYPT 2015, pp. 281–310, 2015.

      27. Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B., Attribute-Based Encryption for Circuits from Multilinear Maps, in: Advances in Cryptology. CRYPTO 2013. Lecture Notes in Computer Science, Canetti R., Garay J.A. (Eds), Springer, Berlin, Heidelberg, vol. 8043, pp. 479–499.

      28. Gentry, C., Fully homomorphic encryption using ideal lattices, in: STOC, pp. 169–178, 2009.

      29. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., Rimba, P., A taxonomy of blockchain-based systems for architecture design, in Software Architecture (ICSA). 2017 IEEE International Conference on Communication Security, IEEE, pp. 243–252, 2017.

      30. Zhang, L., Cai, Z., Wang, X., Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Service Manag., 13, 335–348, 2016.

      31. Zheng, X., Cai, Z., Li, J., Gao, H., Location-privacy-aware review publication mechanism for local business service systems, in: INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1–9, 2017.

      32. Zheng, X., Cai, Z., Li, Y., Data linkage in smart iot systems: A consideration from privacy perspective. IEEE Commun. Mag., 56, 55–61, 2018.

      33. Zheng, X., Luo, G., Cai, Z., A fair mechanism for private data publication in online social networks. IEEE Trans. Netw. Sci. Eng., 7, 880–891, 2020.

      34. Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H., Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv., 14, 4, Article 352, 2018.

      35. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H., An overview of blockchain technology: Architecture, consensus, and future trends, in Big Data (Big Data Congress). International Congress on IEEE Communications, pp. 557–564, 2017.

      36. Zyskind, Nathan, O., et al., Decentralizing privacy: Using blockchain to protect personal data, in: Security and Privacy Workshops (SPW), pp. 180–184, 2015.

      37. Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N., Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, 2017.

      38. Miller, A., Xia, Y., Croman, K., Shi, E., Song, D., The honey badger of BFT protocols, in: CCS, pp. 31–42, 2016.

      39. Restuccia, F. and Das, S.K., Optimizing the lifetime of sensor networks with uncontrollable mobile sinks and qos constraints. ACM Trans. Sens. Netw. (TOSN), 12, 1, 2, 2016.

      41. Restuccia, F., D’Oro, S., Melodia, T., Securing the internet of things in the age of machine learning and software-defined networking. IEEE Internet Things J., 5, 6, 4829–4842, 2018.

      42. Restuccia, F., Ghosh, N., Bhattacharjee, S., Das, S.K., Melodia, T., Quality of information in mobile crowd sensing: Survey and research challenges. ACM Trans. Sens. Netw. (TOSN), 13, 4, 34, 2017.

      43. Bekara, C., Security issues and challenges for the IoT-based smart grid. Proc. Comput. Sci., 34, 532–537, 2014.

      44. Frustaci, M., Pasquale, P., Gianluca, A., Fortino, G., Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet Things J., 5, 4, 2483–2495, 2017.

      45. Alrawais, A., Alhothaily, A., Hu, C., Cheng, X., Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput., 21, 2, 34–42, 2017.

      46. Agrawal, R., Chatterjee, J.M., Kumar, A., Rathore, P.S. (Eds.), Blockchain Technology and the Internet of Things: Challenges and Applications in Bitcoin and Security, CRC Press, UK, 2020.

      Email: [email protected]; ORCID: https://orcid.org/0000-0003-0057-7662

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или СКАЧАТЬ