全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Mehdi Benchoufi , Philippe Ravaud
来源:[J].Trials(IF 2.206), 2017, Vol.18 (1)Springer
摘要:... A new technology, Blockchain, may be a key to addressing these challenges and should draw the attention of the whole clinical research community.
作者:Qi Liu , Xiao Zou
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2019, Vol.2019 (1), pp.1-11Springer
摘要:... Blockchain technology is considered as another subversive technology following cloud computing, wireless sensor networks, and big data. It is highly concerned by governments, financial institutions, and technology companies. Blockchain technology is essentially a technical s...
作者:Huakun Liu , Xin Wei , Ruliang Xiao ...
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2018, Vol.2018 (1), pp.1-14Springer
摘要:Abstract(#br)In order to prevent sensitive data tampering in the application of security monitoring, intelligent traffic, and other sensitive Internet of Things, the research on WMSN (wireless multimedia sensor networks) application system based on blockchain and IPFS (InterPlane...
作者:Tim K. Mackey , Tsung-Ting Kuo , Basker Gummadi ...
来源:[J].BMC Medicine(IF 6.679), 2019, Vol.17 (1), pp.1-17DOAJ
摘要:Abstract Blockchain is a shared distributed digital ledger technology that can better facilitate data management, provenance and security, and has the potential to transform healthcare. Importantly, blockchain represents a data architecture, whose application goes far beyond Bit...
作者:Haibo Yi
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2019, Vol.2019 (1), pp.1-9Springer
摘要:... We present techniques to exploit blockchain in P2P network to improve the security of e-voting. First, we design a synchronized model of voting records based on distributed ledger technology (DLT) to avoid forgery of votes. Second, we design a user credential model based on e...
作者:Haibo Yi
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2019, Vol.2019 (1), pp.1-9DOAJ
摘要:... We present techniques to exploit blockchain in P2P network to improve the security of e-voting. First, we design a synchronized model of voting records based on distributed ledger technology (DLT) to avoid forgery of votes. Second, we design a user credential model based on e...
作者:Yongjun Ren , Yan Leng , Fujian Zhu ...
来源:[J].Sensors(IF 1.953), 2019, Vol.19 (10)DOAJ
摘要:... Therefore, this paper adopts blockchain technology to store data, which improves the security of the collected data. Moreover, a storage model based on blockchain in WBAN is proposed in our solution. However, blockchain storage brings new problems, for example, that the sto...
作者:Zhanyang Xu , Qingfan Geng , Hao Cao ...
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2019, Vol.2019 (1), pp.1-12Springer
摘要:... The paper proposes a blockchain-powered resource provisioning (BPRP) method to solve the above problems. Technically, we use the directed acyclic graph in the graph theory to represent the workflow task and optimize the workflow scheduling strategy in the presence of uncertai...
作者:Geetanjali Rathee , Ashutosh Sharma , Razi Iqbal ...
来源:[J].Sensors(IF 1.953), 2019, Vol.19 (14)DOAJ
摘要:... In order to prevent these issues, a blockchain technique is considered the best technique that provides secrecy and protection to the control system in real time conditions. In this paper, the issue of security in smart sensors of connected vehicles that can be compromis...
作者:Abdelouahid Derhab , Mohamed Guerroumi , Abdu Gumaei ...
来源:[J].Sensors(IF 1.953), 2019, Vol.19 (14)DOAJ
摘要:... To this end, we propose a security architecture that integrates the Blockchain and the Software-defined network (SDN) technologies. The proposed security architecture is composed of: (a) an intrusion detection system, namely RSL-KNN, which combines the Random Subspace Learnin...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×