References
- Y. Yuan & F. Y. Wang. (2016). Towards blockchain-based intelligent transportation systems. In Intelligent Transportation Systems (ITSC), 2016 IEEE19th International Conference on, 2663-2668.
- J. Sun, J. Yan & K. Z. Zhang. (2016). Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financial Innovation, 2(1), 26.
- A. Dorri, S. S. Kangere, R. Jurdak & P. Gauravarm. (2017). Blockchain for IoT security and Privacy: The case study of a smart home. In Pervasive Computing and Communications Workshop, 2017 IEEE International Conference on, 618-623.
- S. Lee & D. Lee. (2016). Actual Cases for Smart Fusion Industry based on Internet of Things. Journal of the Korea Convergence Society, 7(2), 1-6. https://doi.org/10.15207/JKCS.2016.7.2.001
- P. Treleaven, R. G. Brown & D. Yang. (2017). Blockchain Technology in Finance. Computer, 50(9), 14-17. https://doi.org/10.1109/MC.2017.3571047
- H. Mun. (2018). Biometric information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
- K. M. Khan, J. Arshad & M. M. Khan. (2018). Secure Digital Voting System Based on Blockchain Technology. International Journal of Electronic Government Research (IJEGR), 14(1), 53-62. https://doi.org/10.4018/IJEGR.2018010103
- H. M. Kim & M. Laskowski. (2018). Toward an ontology-driven blockchain design for supply-chain provenance. Intelligent Systems in Accounting, Finance and Management, 25(1), 18-27. https://doi.org/10.1002/isaf.1424
- K. Fan, S. Wang, Y. Ren, H. Li & Y. Yang. (2018). MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain. Journal of Medical Systems, 42(8), 136. https://doi.org/10.1007/s10916-018-0993-7
- J. Gao, K. O. Asamoah, E. B. Sifah, A. Smahi, Q. Xia, H. Xia & G. Dong. (2018). GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access, 6, 9917-9925. https://doi.org/10.1109/ACCESS.2018.2806303
- Symantec internet security threat report. Technical report, Symantec Corporation. url: https://www.symantec.com/content/dam/symantec/docs /reports/istr-23-2018-en.pdf (last access: 2018.06.30.)
- N. Kshetri. (2017). Can Blockchain Strengthen the Internet of Things?. IT Professional, 19(4), 68-72. https://doi.org/10.1109/MITP.2017.3051335
- S. Hong & S. Park. (2017). The Research on Blockchain-based Secure IoT Authentication. Journal of the Korea Convergence Society, 8(11), 57-62. https://doi.org/10.15207/JKCS.2017.8.11.057
- T. B. Lee & M. Fischetti. (2001). Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor, DIANE Publishing Company.
- Satoshi Nakamoto, Bitcoin: A peer-to-peer electronic cash system, url: http://www.bitcoin.org (last access: 2018.06.30.)
- M. Castro & B. Liskov. (2002). Practical Byzantine fault tolerance and proactive recovery. ACM Transaction on Computer Systems (TOCS), 20(4), 398-461. https://doi.org/10.1145/571637.571640
- A. Back. (2002). Hashcash - a denial of service counter-measure. url: http://hashcash.org/papers/hashcash.pdf (last access: 2018.06.30.).
- S. Underwood. (2016). Blockchain beyond bitcoin. Communications of the ACM, 59(11), 15-17.
- X. Feng & Y. Zhao. (2017). Digital forensics challenges to big data in the cloud. 2017 IEEE International Conference on Internet of Things, 858-862.
- M. Wundram, F. C. Freiling & C. Moch. (2013). Anti-forensics: the next step in digital forensics tool testing. 2013 Seventh IEEE International Conference on IT Security Incident Management and IT Forensics (IMF), 83-97.
- D. Miller. (2018). Blockchain and the Internet of Things in the Industrial Sector. IT Professional, 20(3), 15-18.
- BBC News, url: https://www.bbc.com/news/technology-42237162 (last access: 2018.06.30.).
- W. Li, A. Sforzin, S. Fedorov & G. O. Karame. (2017). Towards scalable and private industrial blockchains. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, 9-14.
- L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert & P. Saxena. (2016). A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 17-30.
- M. Divya & N. B. Biradar. (2018). IOTA-Next Generation Block chain. International Journal of Engineering And Computer Science, 7(4), 23823-23826.
- S. Shin, G. Chae & T. Lee. (2015). An Investigation Study to Reduce Security Threat in the Internet of Things Environment, Journal of Convergence for Information Technology, 5(4), 31-36. https://doi.org/10.22156/CS4SMB.2015.5.4.031
- G. Zyskind & O. Nathan. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE security and Privacy Workshop (SPW), 180-184.