|
[1]
|
Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
|
|
[2]
|
Zheng, Z., Xie, S., Dai, H., Chen, X. and Wang, H. (2017) An Overview of Blockchain Technology: Architecture, Consensus and Future Trends. 2017 IEEE International Congress on Big Data, Honolulu, 25-30 June 2017, 557-564. [Google Scholar] [CrossRef]
|
|
[3]
|
Wang, Q., Zhu, X.Q., Ni, Y.Y., Gu, L. and Zhu, H.B. (2010) Blockchain for the IoT and Industrial IoT: A Review. Internet of Things, 10, Article No. 100081. [Google Scholar] [CrossRef]
|
|
[4]
|
Sharma, A., Schuhknecht, F.M., Agrawal, D. and Dittrich, J. (2019) Blurring the Lines between Blockchains and Database Systems: The Case of Hyperledger Fabric. Proceedings of the 2019 International Conference on Management of Data (SIGMOD’19), 105-122. [Google Scholar] [CrossRef]
|
|
[5]
|
Androulaki, E., Barger, A., Bortnikov, V., et al. (2018) Hy-perledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference (EuroSys’18), 1-15. [Google Scholar] [CrossRef]
|
|
[6]
|
Zyskind, G., Nathan, O., et al. (2015) Decentralizing Privacy: Us-ing Blockchain to Protect Personal Data. 2015 IEEE Security and Privacy Workshops, San Jose, 21-22 May 2015, 180-184. [Google Scholar] [CrossRef]
|
|
[7]
|
Shafagh, H., Burkhalter, L., Hithnawi, A. and Duquennoy, S. (2017) Towards Blockchain-Based Auditable Storage and Sharing of IoT Data. 2017 on Cloud Computing Security Workshop, 45-50. [Google Scholar] [CrossRef]
|
|
[8]
|
Ouaddah, A., Elkalam, A.A. and Ouahman, A.A. (2017) FairAc-cess: A New Blockchain-Based Access Control Framework for the Internet of Things. Security and Communication Networks, 9, 5943-5964. [Google Scholar] [CrossRef]
|
|
[9]
|
Zhang, Y., Kasahara, S., Shen, Y., Jiang, X. and Wan, J. (2019) Smart Con-tract-Based Access Control for the Internet of Things. IEEE Internet of Things Journal, 6, 1594-1605. [Google Scholar] [CrossRef]
|
|
[10]
|
Liu, H., Han, D. and Li, D. (2020) Fabric-iot: A Block-chain-Based Access Control System in IoT. IEEE Access, 8, 18207-18218. [Google Scholar] [CrossRef]
|
|
[11]
|
Ding, S., Cao, J., Li, C., Fan, K. and Li, H. (2019) A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access, 7, 38431-38441. [Google Scholar] [CrossRef]
|
|
[12]
|
Sahai, A. and Waters, B. (2005) Fuzzy Identity-Based En-cryption. In: Cramer, R., Ed., Advances in Cryptology—EUROCRYPT 2005, Vol. 3494, Springer, Berlin, Heidelberg, 457-473. [Google Scholar] [CrossRef]
|
|
[13]
|
Bethencourt, J., Sahai, A. and Waters, B. (2007) Cipher-text-Policy Attribute-Based Encryption. 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, 20-23 May 2007, 321-334. [Google Scholar] [CrossRef]
|