2022
DOI: 10.1007/978-3-031-06791-4_46
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
0
0
Order By: Relevance
“…For the 1-out-of-2 variation, Chowdhury et al [43] provided non-adaptive oblivious transfer procedures for UC. Bai et al [44] suggested a UC-secure adaptive k-out-of-N protocol, which is safe under bilinear assumptions, to solve the difficulty of extending to the adaptive k-out-of-N environment while still guaranteeing UC security. OpenStack's security issues and potential solutions were laid out and compared by Psathas et al [45] in their examination of OpenStack inside the UC security framework.…”
Section: Ubiquitous Security Frameworkmentioning
confidence: 99%
“…For the 1-out-of-2 variation, Chowdhury et al [43] provided non-adaptive oblivious transfer procedures for UC. Bai et al [44] suggested a UC-secure adaptive k-out-of-N protocol, which is safe under bilinear assumptions, to solve the difficulty of extending to the adaptive k-out-of-N environment while still guaranteeing UC security. OpenStack's security issues and potential solutions were laid out and compared by Psathas et al [45] in their examination of OpenStack inside the UC security framework.…”
Section: Ubiquitous Security Frameworkmentioning
confidence: 99%