References
- V. Gramoli, "From blockchain consensus back to byzantine consensus," Future Generation Computer Systems, vol.107, pp. 760-769, 2020. https://doi.org/10.1016/j.future.2017.09.023
- N. Z. Aitzhan and D. Svetinovic, "Security and privacy in decentralized energy trading through multisignatures, blockchain and anonymous messaging streams," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 840-852, 2016. https://doi.org/10.1109/tdsc.2016.2616861
- H. M. Kim and M. Laskowski, "Toward an ontology-driven blockchain design for supply-chain provenance," Intelligent Systems in Accounting, Finance and Management, vol. 25, no. 1, pp. 18-27, 2018. https://doi.org/10.1002/isaf.1424
- S. Rahmadika and K. H. Rhee, "Toward privacy-preserving shared storage in untrusted blockchain P2P networks," Wireless Communications and Mobile Computing, vol. 2019, article no. 6219868, 2019.
- A. H. Lone and R. N. Mir, "Forensic-chain: Ethereum blockchain based digital forensics chain of custody," Scientific and Practical Cyber Security Journal, vol. 1, no. 2, pp. 21-27, 2018.
- S. Wei, S. Li, P. Liu, and M. Liu, "BAVP: blockchain-based access verification protocol in LEO constellation using IBE keys," Security and Communication Networks, vol. 2018, article no. 7202806, 2018.
- K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, et al., "On scaling decentralized blockchains," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 106-125.
- I. Eyal and E. G. Sirer, "Bitcoin-NG: a secure, faster, better blockchain," 2015 [Online]. Available: https://hackingdistributed.com/2015/10/14/bitcoin-ng/.
- M. Milutinovic, W. He, H. Wu, and M. Kanwal, "Proof of luck: an efficient blockchain consensus protocol," in Proceedings of the 1st Workshop on System Software for Trusted Execution, Trento, Italy, 2016, pp. 1-6.
- G. Pappalardo, T. Di Matteo, G. Caldarelli, and T. Aste, "Blockchain inefficiency in the bitcoin peers network," EPJ Data Science, vol. 7, article no. 30, 2018.
- X. Liu, W. Wang, D. Niyato, N. Zhao, and P. Wang, "Evolutionary game for mining pool selection in blockchain networks," IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 760-763, 2018. https://doi.org/10.1109/lwc.2018.2820009
- A. Kiayias and G. Panagiotakos, "Speed-security tradeoffs in blockchain protocols," IACR Cryptology ePrint Archive, vol. 2015, article no. 1019, 2015.
- Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, "Optimal pricing-based edge computing resource management in mobile blockchain," 2017 [Online]. Available: https://arxiv.org/abs/1711.01049.
- R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Proceedings of the 1st International Conference on Peer-to-Peer Computing, Linkoping, Sweden, 2001, pp. 101-102.
- M. Hearn, "Bitcoinj: a Java implementation of a bitcoin client," 2013 [Online]. Available: https://bitcoinj.github.io/.
- S. Feld, M. Schonfeld, and M. Werner, "Analyzing the deployment of Bitcoin's P2P network under an ASlevel perspective," Procedia Computer Science, vol. 32, pp. 1121-1126, 2014. https://doi.org/10.1016/j.procs.2014.05.542
- M. Fadhil, G. Owenson, and M. Adda, "A bitcoin model for evaluation of clustering to improve propagation delay in bitcoin network," in Proceedings of 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES), Paris, France, 2016, pp. 468-475.
- M. Fadhil, G. Owenson, and M. Adda, "Locality based approach to improve propagation delay on the bitcoin peer-to-peer network," in Proceedings of 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, 2017, pp. 556-559.
- M. Fadhil, G. Owen, and M. Adda, "Bitcoin network measurements for simulation validation and parameterization," in Proceedings of the 11th International Network Conference - INC2016. Plymouth, UK: University of Plymouth, 2016, pp. 109-114.
- E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, "Enhancing bitcoin security and performance with strong consistency via collective signing," in Proceedings of the 25th USENIX Security Symposium, Austin, TX, 2016, pp. 279-296.
- C. Decker and R. Wattenhofer, "Information propagation in the bitcoin network," in Proceedings of IEEE International Conference on Peer-to-Peer Computing, Trento, Italy, 2013, pp. 1-10.
- Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: architecture, consensus, and future trends," in Proceedings of 2017 IEEE International Congress on Big Data, Honolulu, HI, 2017, pp. 557-564.
- R. Dennis and G. Owen, "Rep on the block: a next generation reputation system based on the Blockchain," in Proceedings of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 2015, pp. 131-138.
- X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, "A taxonomy of blockchain-based systems for architecture design," in Proceedings of 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 2017, pp. 243-252.
- S. Rahmadika, K. Lee, and K. H. Rhee, "Blockchain-enabled 5G autonomous vehicular networks," in Proceedings of 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Bandung, Indonesia, 2019, pp. 275-280.
- Y. Sompolinsky and A. Zohar, "Accelerating Bitcoin's transaction processing: fast money grows on trees, not chains," IACR Cryptology ePrint Archive, vol. 2013, article no. 881, 2013.
- C. Decker and R. Wattenhofer, "Bitcoin transaction malleability and MtGox," in Computer Security - ESORICS 2014. Cham: Springer, 2014, pp. 313-326.
- S. Rahmadika and K. H. Rhee, "Blockchain technology for providing an architecture model of decentralized personal health information," International Journal of Engineering Business Management, 2018. https://doi.org/10.1177%2F1847979018790589
- I. Eyal and E. G. Sirer, "Majority is not enough: Bitcoin mining is vulnerable," in financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 436-454.
- A. Sapirshtein, Y. Sompolinsky, and A. Zohar, "Optimal selfish mining strategies in bitcoin," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 515-532.
- E. Heilman, "One weird trick to stop selfish miners: fresh bitcoins, a solution for the honest miner," in Financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 161-162.
- S. Rahmadika, B. J. Kweka, H. Kim, and K. Rhee, "A scoping review in defend against selfish mining attack in bitcoin," IT Convergence Practice, vol. 6, no. 3, pp. 18-26, 2018.
- S. Rahmadika and K. H. Rhee, "Preliminary of selfish mining strategy on the decentralized model of personal health information," in Advanced Multimedia and Ubiquitous Engineering. Singapore: Springer, 2018, pp. 679-685.
- A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun, "Tampering with the delivery of blocks and transactions in bitcoin," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, pp. 692-705.
- A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the security and performance of proof of work blockchains," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016, pp. 3-16.
- M. Apostolaki, A. Zohar, and L. Vanbever, "Hijacking bitcoin: routing attacks on cryptocurrencies," in Proceedings of 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2017, pp. 375-392.
- R. Khalil and A. Gervais, "Revive: rebalancing off-blockchain payment networks," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, 2017, pp. 439-453.
- X. Fu, H. Wang, P. Shi, Y. Fu, and Y. Wang, "Jcledger: a blockchain based distributed ledger for JointCloud computing," in Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, pp. 289-293.
- X. Ren, P. London, J. Ziani, and A. Wierman, "Datum: managing data purchasing and data placement in a geo-distributed data market," IEEE/ACM Transactions on Networking, vol. 26, no. 2, pp. 893-905, 2018. https://doi.org/10.1109/TNET.2018.2811374
- S. Spiekermann and J. Korunovska, "Towards a value theory for personal data," Journal of Information Technology, vol. 32, no. 1, pp. 62-84, 2017. https://doi.org/10.1057/jit.2016.4
- X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, 2009. https://doi.org/10.1109/JSAC.2009.090502
- H. Yang, H. Kim, and K. Mtonga, "An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system," Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1059-1069, 2015. https://doi.org/10.1007/s12083-014-0299-6
- M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Advances in Cryptology - EUROCRYPT'98. Heidelberg: Springer, 1998, pp. 127-144.
- R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proceedings of the 14th ACM conference on Computer and Communications Security, Alexandria, VA, 2007, pp. 185-194.
- C. Sur, C. D. Jung, Y. Park, and K. H. Rhee, "Chosen-ciphertext secure certificateless proxy re-encryption," in Communications and Multimedia Security. Heidelberg: Springer, 2010, pp. 214-232.
- S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, "Kerberos authentication and authorization system (Project Athena Technical Plan, Section E.2.1)," 1988 [Online]. Available: http://web.mit.edu/Saltzer/www/publications/atp.html.
- S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2008 [Online]. Available: https://git.dhimmel.com/bitcoin-whitepaper/.
- A. Ouaddah, A. Abou Elkalam, and A. A. Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT," in Europe and MENA Cooperation Advances in Information and Communication Technologies. Cham: Springer, 2017, pp. 523-533.
- Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, "BBDS: blockchain-based data sharing for electronic medical records in cloud environments," Information, vol. 8, article no. 44, 2017.
- D. Di Francesco Maesa, P. Mori, and L. Ricci, "Blockchain based access control," in Distributed Applications and Interoperable Systems. Cham: Springer, 2017, pp. 206-220.
- J. Poon and T. Dryja, "The bitcoin lightning network: scalable off-chain instant payments," 2016 [Online]. Available: https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.
- G. Gutoski and D. Stebila, "Hierarchical deterministic bitcoin wallets that tolerate key leakage," in Financial Cryptography and Data Security. Heidelberg: Springer, 2015, pp. 497-504.