Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Fangyu Gai"'
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-15
Autor:
Xinying Yang, Sheng Wang, Feifei Li, Yuan Zhang, Wenyuan Yan, Fangyu Gai, Benquan Yu, Likai Feng, Qun Gao, Yize Li
Publikováno v:
2022 IEEE 38th International Conference on Data Engineering (ICDE).
Publikováno v:
2021 17th International Conference on Mobility, Sensing and Networking (MSN).
Publikováno v:
ICDCS
Permissioned blockchains employ Byzantine fault-tolerant (BFT) state machine replication (SMR) to reach agreement on an ever-growing, linearly ordered log of transactions. A new paradigm, combined with decades of research in BFT SMR and blockchain (n
Publikováno v:
IWQoS
Sidechains enable off-chain scaling by sending transactions in a private network rather than broadcasting them in the public blockchain (i.e., the mainchain) network. To this end, classic Byzantine fault-tolerant (BFT) consensus protocols such as PBF
Publikováno v:
INFOCOM
HotStuff is a state-of-the-art Byzantine fault-tolerant consensus protocol. It can be pipelined to build large-scale blockchains. One of its variants called LibraBFT is adopted in Facebook's Libra blockchain. Although it is well known that pipelined
Bitcoin-NG is among the first blockchain protocols to approach the \emph{near-optimal} throughput by decoupling blockchain operation into two planes: leader election and transaction serialization. Its decoupling idea has inspired a new generation of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::37fcc9f2d089ccd13b8a5c692909c2c9
http://arxiv.org/abs/2001.05082
http://arxiv.org/abs/2001.05082
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2017 (2017)
The integration of social networking concepts with Internet of Vehicles (IoV) has led to the novel paradigm “Social Internet of Vehicles (SIoV),” which enables vehicles to establish social relationships autonomously to improve traffic conditions
Publikováno v:
TrustCom/BigDataSE
Nowadays, with the size and complexity of software increasing rapidly, vulnerabilities are becoming diversified and hard to identify. It is unpractical to detect and exploit vulnerabilities by manual construction. Therefore, an efficient automatic me
Publikováno v:
ICCCN
The existing identity authentication of IoT devices mostly depends on an intermediary institution, i.e., a CA server, which suffers from the single-point-failure attack. Even worse, the critical data of authenticated devices can be tampered by inner