Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …
recent years because of their potential to improve data availability and unlock new business …
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …
transportation, and healthcare, are the convergence of several technologies. There are …
Machine learning based privacy-preserving fair data trading in big data market
In the era of big data, the produced and collected data explode due to the emerging
technologies and applications that pervade everywhere in our daily lives, including internet …
technologies and applications that pervade everywhere in our daily lives, including internet …
Catena: Efficient non-equivocation via bitcoin
We present Catena, an efficiently-verifiable Bitcoin witnessing scheme. Catena enables any
number of thin clients, such as mobile phones, to efficiently agree on a log of application …
number of thin clients, such as mobile phones, to efficiently agree on a log of application …
MuSig-DN: Schnorr multi-signatures with verifiably deterministic nonces
MuSig is a multi-signature scheme for Schnorr signatures, which supports key aggregation
and is secure in the plain public key model. Standard derandomization techniques for …
and is secure in the plain public key model. Standard derandomization techniques for …
Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks
J Liu, Y Yu, J Jia, S Wang, P Fan… - Tsinghua Science …, 2019 - ieeexplore.ieee.org
Amidst the rapid development of the Internet of Things (IoT), Vehicular Ad-Hoc NETwork
(VANET), a typical IoT application, are bringing an ever-larger number of intelligent and …
(VANET), a typical IoT application, are bringing an ever-larger number of intelligent and …
Blockchain based privacy-preserving software updates with proof-of-delivery for internet of things
A large number of IoT devices are connected via the Internet. However, most of these IoT
devices are generally not perfect-by-design even have security weaknesses or …
devices are generally not perfect-by-design even have security weaknesses or …
[HTML][HTML] A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things
Abstract Industrial Internet-of-Things (IIoT for short) which is the basis of Industry 4.0,
extends Internet connectivity beyond traditional computing devices, for example …
extends Internet connectivity beyond traditional computing devices, for example …
Toward decentralized fair data trading based on blockchain
Various emerging applications and services such as smartphones, wearable devices, and
Inter-net of Things (IoT) have brought great convenience to people's daily life, while …
Inter-net of Things (IoT) have brought great convenience to people's daily life, while …
An efficient blockchain-based authentication scheme with transferability
X **, K Omote - PloS one, 2024 - journals.plos.org
In the development of web applications, the rapid advancement of Internet technologies has
brought unprecedented opportunities and increased the demand for user authentication …
brought unprecedented opportunities and increased the demand for user authentication …