Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Trusted Third Parties"'
Autor:
Guangquan Xu, Yao Zhang, Litao Jiao, Emmanouil Panaousis, Kaitai Liang, Hao Wang, Xiaotong Li
Publikováno v:
IEEE Access, Vol 7, Pp 174740-174749 (2019)
This paper characterizes a contract signing protocol with high efficiency in Internet of Things. Recent studies show that existing contract-signing protocols can achieve abuse-freeness and resist inference attack, but cannot meet the high-efficiency
Externí odkaz:
https://doaj.org/article/40c208731e644f61a81175381ec3ea91
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Eldair Fabricio Dornelles, Rafael Z. Frantz, Sandro Sawicki, Antonia M. Reina Quintero, Carlos Molina-jimenez, Fernando Parahyba, Jose Bocanegra, Fabricia Roos-Frantz
Integration processes involve Business Constraints and Service Level Agreements that, with current technology, are not monitored or enforced auto matically at run–time. This approach leaves the participants with no means of supervising the developm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56ab5f30cab3d0ff91abc55d0e62dcd7
Autor:
Goharshady, Amir
Suppose that Alice plans to buy a physical good from Bob over a programmable Blockchain. Alice does not trust Bob, so she is not willing to pay before the good is delivered off-chain. Similarly, Bob does not trust Alice, so he is not willing to deliv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0046890216d867d11446995ea2210e49
https://hal.archives-ouvertes.fr/hal-03322546
https://hal.archives-ouvertes.fr/hal-03322546
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dris___00893::a450379a27da8a073149322aa46c6590
http://resolver.tudelft.nl/uuid:40533bc5-08dc-4bb5-9c16-b97501699291
http://resolver.tudelft.nl/uuid:40533bc5-08dc-4bb5-9c16-b97501699291
Publikováno v:
Weippl, E. (ed.), WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016, 111-122. New York : ACM
STARTPAGE=111;ENDPAGE=122;TITLE=Weippl, E. (ed.), WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016
Weippl, E. (ed.), WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016, pp. 111-122
WPES@CCS
15th ACM Workshop on Privacy in the Electronic Society, WPES 2016. 24 October 2016, 111-122
STARTPAGE=111;ENDPAGE=122;TITLE=Weippl, E. (ed.), WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016
Weippl, E. (ed.), WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016, pp. 111-122
WPES@CCS
15th ACM Workshop on Privacy in the Electronic Society, WPES 2016. 24 October 2016, 111-122
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c97920d5614a25b0e5d4dffa9db39531
http://hdl.handle.net/2066/161350
http://hdl.handle.net/2066/161350
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Communications Magazine. 50:53-61
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to the smart grid. In this arti