![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessEvicting and filling attack for linking multiple network addresses of Bitcoin nodes
Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...
-
Article
Open AccessAn efficient confidentiality protection solution for pub/sub system
Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...
-
Chapter and Conference Paper
A Lightweight Time Series Main-Memory Database for IoT Real-Time Services
With the rapid development of Internet of things (IoT), a large number of IoT sensing devices produces amounts of sensing data in every second. These data should be processed in real-time to support IoT real-t...
-
Chapter and Conference Paper
Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption
The publish/subscribe model offers a loose-couple communication paradigm for large-scale distribute applications. Content-based publish/subscribe system allows publishers send events with attributes to admin s...
-
Chapter and Conference Paper
Design of Personalized News Comments Recommendation System
Nowadays people spend lots of time on browsing news on the Internet. News comment as one of the most common things that people find on the website, is earning more attention than before. News comments have sig...