2019
DOI: 10.1016/j.ins.2019.04.011
|View full text |Cite
|
Sign up to set email alerts
|

Block-DEF: A secure digital evidence framework using blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
9
1

Relationship

4
6

Authors

Journals

citations
Cited by 302 publications
(111 citation statements)
references
References 25 publications
0
111
0
Order By: Relevance
“…Charging pile may advertise the quality and availability of service to the EVs which can make decision of charging choice to eliminate the waste of time and energy in case of choosing another pile due to capacity limit and profile mismatch. When an EV chooses to drive to the charging pile, the charging scheduler may prepare the preserved matched pile and correspondent power load budget according to the physical and electrical profile of the given vehicle type [27]. The request reserved renegotiation procedure eliminates possibility of the denies of service for the incoming request due to limited resource such as power and related service infrastructure.…”
Section: Modeling Of Charging Pilementioning
confidence: 99%
“…Charging pile may advertise the quality and availability of service to the EVs which can make decision of charging choice to eliminate the waste of time and energy in case of choosing another pile due to capacity limit and profile mismatch. When an EV chooses to drive to the charging pile, the charging scheduler may prepare the preserved matched pile and correspondent power load budget according to the physical and electrical profile of the given vehicle type [27]. The request reserved renegotiation procedure eliminates possibility of the denies of service for the incoming request due to limited resource such as power and related service infrastructure.…”
Section: Modeling Of Charging Pilementioning
confidence: 99%
“…Their method also suffers from the vehicleto-vehicle trust management in spite of their incentive-based credit management scheme. As a wider range, wireless issues has also drawn much more research interest [28][29][30][31][32][33][34][35] during the last two decades.…”
Section: Related Workmentioning
confidence: 99%
“…As shown above, the rise of new technologies (e.g. Internet of Vehicles, [34][35][36][37] Heterogeneous Sensor Networks, [38][39][40][41][42][43] Edge Computing, 44,45 Smart City, 46 Blockchain) [47][48][49] makes CIA unsuitable. In this section, we will answer two fundamental problems: which security properties are fundamental?…”
Section: Connotation Of Information Securitymentioning
confidence: 99%