![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning
As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...
-
Chapter and Conference Paper
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...
-
Chapter and Conference Paper
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts
Smart contracts, that allow parties to establish agreements based on predefined rules without a trusted third-party, have been explored in various applications. However, the main drawback of smart contracts is...
-
Chapter and Conference Paper
Fully Discover the Balance of Lightning Network Payment Channels
The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...
-
Chapter and Conference Paper
ActAnyware - Blockchain-Based Software Licensing Scheme
Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...
-
Chapter and Conference Paper
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds
Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...
-
Chapter and Conference Paper
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture
With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...
-
Chapter and Conference Paper
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...