A survey of blockchain consensus protocols
Blockchain consensus protocols have been a focus of attention since the advent of Bitcoin.
Although classic distributed consensus algorithms made significant contributions to the …
Although classic distributed consensus algorithms made significant contributions to the …
A comprehensive review of blockchain consensus mechanisms
Since the advent of distributed ledger technologies, they have provided diverse
opportunities in a wide range of application domains. This article brings a comprehensive …
opportunities in a wide range of application domains. This article brings a comprehensive …
Blockchain for AI: Review and open research challenges
Recently, artificial intelligence (AI) and blockchain have become two of the most trending
and disruptive technologies. Blockchain technology has the ability to automate payment in …
and disruptive technologies. Blockchain technology has the ability to automate payment in …
Blockchain for smart communities: Applications, challenges and opportunities
Since the success of Bitcoin, there have been increased focus of studying the application of
blockchain in a broad range of applications, such as in solutions facilitating identity privacy …
blockchain in a broad range of applications, such as in solutions facilitating identity privacy …
A survey of consensus algorithms in public blockchain systems for crypto-currencies
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
Data security and privacy protection issues in cloud computing
D Chen, H Zhao - 2012 international conference on computer …, 2012 - ieeexplore.ieee.org
It is well-known that cloud computing has many potential advantages and many enterprise
applications and data are migrating to public or hybrid cloud. But regarding some business …
applications and data are migrating to public or hybrid cloud. But regarding some business …
Enabling public auditability and data dynamics for storage security in cloud computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise.
It moves the application software and databases to the centralized large data centers, where …
It moves the application software and databases to the centralized large data centers, where …
ZeroTrace: Oblivious memory primitives from Intel SGX
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
Privacy-preserving public auditing for secure cloud storage
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …
quality applications and services from a shared pool of configurable computing resources …
Proofs of space
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …
a shared resource. The basic idea is to ask the service requestor to dedicate some non …