A Blockchain Tokenizer for Industrial IOT trustless applications

作者: Daniele Mazzei , Giacomo Baldi , Gualtiero Fantoni , Gabriele Montelisciani , Antonio Pitasi

DOI: 10.1016/J.FUTURE.2019.12.020

关键词:

摘要: The Blockchain is a novel technology with a wide range of potential industrial applications. Despite a vast range of tests, prototypes, and proof of concepts implemented in the last …

参考文章(62)
Darrel Hankerson, Alfred Menezes, Elliptic Curve Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.). pp. 397- ,(2005)
Richard E. Hayes, David S. Alberts, Power to the Edge: Command, Control in the Information Age ,(2003)
Steve H. Weingart, Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences cryptographic hardware and embedded systems. pp. 302- 317 ,(2000) , 10.1007/3-540-44499-8_24
David M Blei, Andrew Y Ng, Michael I Jordan, None, Latent dirichlet allocation Journal of Machine Learning Research. ,vol. 3, pp. 993- 1022 ,(2003) , 10.5555/944919.944937
Rossouw von Solms, Johan van Niekerk, From information security to cyber security Computers & Security. ,vol. 38, pp. 97- 102 ,(2013) , 10.1016/J.COSE.2013.04.004
Rodrigo Roman, Jianying Zhou, Javier Lopez, On the features and challenges of security and privacy in distributed internet of things Computer Networks. ,vol. 57, pp. 2266- 2279 ,(2013) , 10.1016/J.COMNET.2012.12.018
Charith Perera, Chi Harold Liu, Srimal Jayawardena, The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey IEEE Transactions on Emerging Topics in Computing. ,vol. 3, pp. 585- 598 ,(2015) , 10.1109/TETC.2015.2390034
Stamatis Karnouskos, Stuxnet worm impact on industrial cyber-physical system security conference of the industrial electronics society. pp. 4490- 4494 ,(2011) , 10.1109/IECON.2011.6120048
Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner, Security and privacy challenges in industrial internet of things design automation conference. ,vol. 17, pp. 54- ,(2015) , 10.1145/2744769.2747942
Donn B. Parker, Information Security in a Nutshell Information Systems Security. ,vol. 6, pp. 14- 19 ,(1997) , 10.1080/10658989709342524