2018 22nd Conference of Open Innovations Association (FRUCT) 2018
DOI: 10.23919/fruct.2018.8468296
|View full text |Cite
|
Sign up to set email alerts
|

A Design of Cyber-physical Production System Prototype Based on an Ethereum Private Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Yang et al [23] presented a method of decentralized private data acquisition blockchain using an on-demand data transmission routing algorithm and M/M/1/k queuing model to meet the trust and time consumption demands of CPPS. Afanasev et al [24] proposed the use of a blockchain network as a platform for a distributed decentralized network through the use of smart contracts for trustful communication between the nodes. While the authors identified several improvements that can be made, they presented the Ethereum blockchain as a positive alternative to current CPPS network alternatives.…”
Section: Cyberphysical System Trustmentioning
confidence: 99%
See 2 more Smart Citations
“…Yang et al [23] presented a method of decentralized private data acquisition blockchain using an on-demand data transmission routing algorithm and M/M/1/k queuing model to meet the trust and time consumption demands of CPPS. Afanasev et al [24] proposed the use of a blockchain network as a platform for a distributed decentralized network through the use of smart contracts for trustful communication between the nodes. While the authors identified several improvements that can be made, they presented the Ethereum blockchain as a positive alternative to current CPPS network alternatives.…”
Section: Cyberphysical System Trustmentioning
confidence: 99%
“…Smart Contract [11], [16], [18], [20], [21], [22], [24], [25], [27], [28], [29], [30], [35], [36], [38], [39], [43], [45], [46], [47], [49], [52], [53], [55] Encryption Asymmetric [18], [23], [27], [30], [42], [46],…”
Section: Technologymentioning
confidence: 99%
See 1 more Smart Citation