2020 3rd International Conference on Information and Computer Technologies (ICICT) 2020
DOI: 10.1109/icict50521.2020.00093
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of Co-operating Blockchains for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The ILP adopts a notary scheme and hash-locking strategies to keep the intermediary entities trustless and incentivized in the payment system. Although the ILP can be expanded beyond payment-focused applications, it requires understanding between the parties of the networks and demands high costs for cryptographic operations [11], [12].…”
Section: Related Workmentioning
confidence: 99%
“…The ILP adopts a notary scheme and hash-locking strategies to keep the intermediary entities trustless and incentivized in the payment system. Although the ILP can be expanded beyond payment-focused applications, it requires understanding between the parties of the networks and demands high costs for cryptographic operations [11], [12].…”
Section: Related Workmentioning
confidence: 99%
“…The ILP adopts a notary scheme and hash-locking strategies to keep the intermediary entities trustworthy and incentivized in the payment system. Although the ILP can be expanded beyond payment-focused applications, it requires understanding between the parties of the networks and demands high costs for cryptographic operations [18,19].…”
Section: Related Workmentioning
confidence: 99%