Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of IoT security and privacy using decentralized blockchain techniques
IoT security is one of the prominent issues that has gained significant attention among the
researchers in recent times. The recent advancements in IoT introduces various critical …
researchers in recent times. The recent advancements in IoT introduces various critical …
Blockchain and Metaverse for peer-to-peer energy marketplace: Research trends and open challenges
Blockchain is an innovative technology destined to shape the future of businesses and
markets around the globe. It promises the democratization of influence and transparency of …
markets around the globe. It promises the democratization of influence and transparency of …
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Privacy preservation of the big data generated, deposited, and communicated by smart IoT
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …
HL-DPoS: An enhanced anti-long-range attack DPoS algorithm
The consensus algorithm is crucial in blockchain for ensuring the validity and security of
transactions across the decentralized network. However, achieving consensus among …
transactions across the decentralized network. However, achieving consensus among …
Towards personalized privacy preference aware data trading: A contract theory based approach
A large number of IoT devices geographically distributed in urban areas makes it attractive
to collect massive data in a crowdsourced manner. To fully exploit the value of …
to collect massive data in a crowdsourced manner. To fully exploit the value of …
BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain
F Chen, B Zhao, Y Gao, W Zhang - The Journal of Supercomputing, 2023 - Springer
With the increase in the market share of data trading, the risks such as identity authentication
and authority management are increasingly intensified. Aiming at the problems of …
and authority management are increasingly intensified. Aiming at the problems of …
A Contract-Based Privacy-Preserving Longitudinal Data Trading Mechanism for IoT
J Li, Y Ni, J Zhang, J Yu, Y He - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices generate vast amounts of real-time data across diverse
sectors, offering lucrative opportunities in the data trading market. This facilitates the …
sectors, offering lucrative opportunities in the data trading market. This facilitates the …
Analysis of Channel Uncertainty in Trusted Wireless Services via Repeated Interactions
B Chen, X Ling, W Cao, J Wang, Z Ding - arxiv preprint arxiv:2406.18204, 2024 - arxiv.org
The coexistence of heterogeneous sub-networks in 6G poses new security and trust
concerns and thus calls for a perimeterless-security model. Blockchain radio access network …
concerns and thus calls for a perimeterless-security model. Blockchain radio access network …
Block-DDT: A Blockchain-Empowered IoT Device Data Trading Scheme in Cloud Computing
X Yang - Proceedings of the 11th ACM International Conference …, 2024 - dl.acm.org
The rapid growth of IoT devices generates valuable data. However, current centralized IoT
device data trading solutions pose privacy and security risks. Emerging blockchain …
device data trading solutions pose privacy and security risks. Emerging blockchain …
Blockchain-based Reputation System For IoT Data Ecosystem: A Utility Maximization Approach
Recently, blockchain technology has been used to build private and secure internet of things
(IoT) data markets and trading systems. Reputation of the trading parties is an important …
(IoT) data markets and trading systems. Reputation of the trading parties is an important …