2022
DOI: 10.1007/978-981-19-1018-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…By sending messages at the TLS record layer, they were able to effectively replicate the communication sessions. Samanta et al [42] used the UC framework for the protocols of RFID authentication, provided a unique, lightweight, and practical protocol with a pseudo-random bit generator for anonymous authentication, and achieved forward secure anonymity, authenticity, and availability in the UC model. For the 1-out-of-2 variation, Chowdhury et al [43] provided non-adaptive oblivious transfer procedures for UC.…”
Section: Ubiquitous Security Frameworkmentioning
confidence: 99%
“…By sending messages at the TLS record layer, they were able to effectively replicate the communication sessions. Samanta et al [42] used the UC framework for the protocols of RFID authentication, provided a unique, lightweight, and practical protocol with a pseudo-random bit generator for anonymous authentication, and achieved forward secure anonymity, authenticity, and availability in the UC model. For the 1-out-of-2 variation, Chowdhury et al [43] provided non-adaptive oblivious transfer procedures for UC.…”
Section: Ubiquitous Security Frameworkmentioning
confidence: 99%