MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning

D Li, D Han, Z Zheng, TH Weng, H Li, H Liu… - Computer Standards & …, 2022 - Elsevier
Abstract Massive Open Online Courses (MOOCs) have become a paramount online
learning approach for flexible learning methods and extensive learning courses. Different …

[HTML][HTML] Blockchain-based dynamic energy management mode for distributed energy system with high penetration of renewable energy

L Wang, S Jiang, Y Shi, X Du, Y Xiao, Y Ma, X Yi… - International Journal of …, 2023 - Elsevier
The emerging blockchain technology is one of the most feasible solutions to decentralized
and autonomous energy management in distributed energy systems (DESs). However, with …

TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain

BB Sezer, S Topal, U Nuriyev - Journal of Information Security and …, 2022 - Elsevier
Traceability and auditability are key structures in supply chain management and
construction. However, trust is the most important aspect of customers in these systems …

SoK: anonymous credentials

SA Kakvi, KM Martin, C Putman, EA Quaglia - International Conference on …, 2023 - Springer
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …

ATRC: An anonymous traceable and revocable credential system using blockchain for VANETs

Y Liu, D He, M Luo, H Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the number of smart vehicle drivers increasing rapidly, privacy-preserving identity
management methods in Vehicular Ad-hoc Networks (VANETs) become more imperative …

AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication

M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …

Repudiable ring signature: Stronger security and logarithmic-size

H Lin, M Wang - Computer Standards & Interfaces, 2022 - Elsevier
Ring signature, introduced by Rivest et al.[Asiacrypt'01], allows a person to sign a document
on behalf of an ad-hoc group (or ring) while hiding the identity of the actual signer. But the …

Improved Resilience of Local Energy Markets using Blockchain Technology and Self-Sovereign Identity

U Cali, MF Dynge, MS Ferdous… - 2022 IEEE 1st Global …, 2022 - ieeexplore.ieee.org
The Digital Green Transition of the energy industry is accelerating as decarbonization and
digitalization of the power market and system are gaining momentum. Unlocking the full and …

PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks

X Yue, X Bi, H Yang, S Bai, Y He - IEEE Transactions on Smart …, 2024 - ieeexplore.ieee.org
Vehicle-to-grid (V2G) networks, as an emerging smart grid paradigm, can be integrated with
renewable energy resources to provide power services and manage electricity demands …

A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT

L Yan, M Ma, D Li, X Huang, Y Ma, K Xie - Computer Networks, 2022 - Elsevier
Anonymous authentication is widely studied for preserving the privacy of IoT devices.
Although attribute-based signature (ABS) schemes can show identity attributes flexibly …