2020
DOI: 10.1007/978-981-15-3647-2_37
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Social Network Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…It was important to choose these metrics -throughput, execution time and block size since the proposed method is novel in that it provides not just a decentralized solution as descriptively presented in [45] but a user-centric self-sovereign identitybased solution. From the preliminary result obtained it was observed that on all fronts execution time, throughput and block size results interestingly follow the pattern documented in the literature [46][47][48][49][50].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…It was important to choose these metrics -throughput, execution time and block size since the proposed method is novel in that it provides not just a decentralized solution as descriptively presented in [45] but a user-centric self-sovereign identitybased solution. From the preliminary result obtained it was observed that on all fronts execution time, throughput and block size results interestingly follow the pattern documented in the literature [46][47][48][49][50].…”
Section: Resultsmentioning
confidence: 99%
“…The need for a consensus technique that is robust and scalable like the Bloc-Tech is thus overarching. In [45] a secured network solution that enforces data control and overcome privacy concerns, and security compromises through blockchain is proposed. The solution is a decentralized solution based on the descriptions presented.…”
Section: Review Of Blockchain Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…As the social network of IoT devices continues to grow by discovering new services and establishing new social relationships, serious security concerns come out. These security concerns include the privacy [12], secure communications [13], detection of cyber-attacks [14] such as the sybil attack [15], owner control over data [16], as well as access control.…”
Section: Introductionmentioning
confidence: 99%