![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
ActAnyware - Blockchain-Based Software Licensing Scheme
Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...
-
Article
Achieving reliable timestamp in the bitcoin platform
Blockchain, the underlying technology of the Bitcoin cryptocurrency, is an innovation of information technology. The blockchain technology has been widely applied in the evidence storage scenarios to prove tha...
-
Article
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
-
Article
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
In the Bitcoin network, the simplified payment verification protocol (SPV) enables a lightweight device such as a mobile phone to participate in the bitcoin network without needed to download and store the who...
-
Article
Fuzzy conditional proxy re-encryption
Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...