共 42 条
[1]
A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2021, 24 (01)
:37-55
[2]
Bartock M., 2021, Hardware -Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases
[3]
Bekaroo G, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND INNOVATIVE BUSINESS PRACTICES FOR THE TRANSFORMATION OF SOCIETIES (EMERGITECH), P361, DOI 10.1109/EmergiTech.2016.7737367
[5]
IoT Traffic Flow Identification using Locality Sensitive Hashes
[J].
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC),
2020,
[7]
Chung, 2019, Guide to Attribute Based Access Control (ABAC) Definition and Considerations
[10]
hyperledger-fabric.readthedocs, Hyperledger Fabric Documentation