Blockchain Based Owner-Controlled Secure Software Updates for Resource-Contrained IoT

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Network and System Security (13. : 2019 : Sapporo) Network and system security
1. Verfasser: Solomon, Gabriel Jerome (VerfasserIn)
Weitere Verfasser: Zhang, Peng (VerfasserIn), Liu, Yuhong (VerfasserIn), Brooks, Rachael (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Ethereum Analysis via Node Clustering 2019 Sun, Hanyi
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing 2019 Wang, Yawei
Distributed Secure Storage System Based on Blockchain and TPA 2019 Wang, Huili
Pre-adjustment Based Anti-collusion Mechanism for Audio Signals 2019 Zhao, Juan
Privacy Preserving Machine Learning with Limited Information Leakage 2019 Tang, Wenyi
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Contrained IoT 2019 Solomon, Gabriel Jerome
Gnocci: Multiplexed Payment Channels for Cryptocurrencies 2019 Pan, Chen
Tell Them from Me: An Encrypted Application Profiler 2019 Mamun, Mohammad
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost 2019 Zheng, Rongxin
Keyed Non-parametric Hypothesis Tests: Protecting Machine Learning from Poisoning Attacks 2019 Cheng, Yao
Using Sparse Composite Document Vectors to Classify VBA Macros 2019 Mimura, Mamoru
Strong Known Related-Key Attacks and the Security of ECDSA 2019 Yuen, Tsz Hon
Threat Assessment of Enterprise Applications via Graphical Modelling 2019 Bilur, Manjunath
Towards Secure Open Banking Architecture: An Evaluation with OWASP 2019 Kellezi, Deina
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters 2019 Sumongkayothin, Karin
Detecting Intruders by User File Access Patterns 2019 Huang, Shou-Hsuan S.
Sequential Aggregate MACs with Detecting Functionality Revisted 2019 Sato, Shingo
EEG-Based Person Authentication with Variational Universal Background Model 2019 Tran, Huyen
A Comparative Study on Network Traffic Clustering 2019 Liu, Yang
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures 2019 Liu, Jinhui
Alle Artikel auflisten