[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Availability analysis of a permissioned blockchain with a lightweight consensus protocol

A Altarawneh, F Sun, RR Brooks, O Hambolu, L Yu… - Computers & …, 2021 - Elsevier
This paper offers a novel approach to the evaluation of provenance blockchain security and
reliability using analytical methods for assessing system availability against malicious miner …

Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications

C Worley, L Yu, R Brooks, J Oakley, A Skjellum… - … Cybersecurity, Trust and …, 2020 - Springer
The recent popularity of cryptocurrencies has highlighted the versatility and applications of a
decentralized, public blockchain. Blockchain provides a data structure that can guarantee …

CR‐BA: Public Key Infrastructure Certificate Revocation Scheme Based on Blockchain and Accumulator

J Xie, X Tan, L Tan - Security and Communication Networks, 2022 - Wiley Online Library
With the development of blockchain, many studies apply blockchain to certificate revocation.
However, existing blockchain‐based certificate revocation schemes have two shortcomings …

CRchain: An efficient certificate revocation scheme based on blockchain

X Ge, L Wang, W An, X Zhou, B Li - International Conference on …, 2021 - Springer
One of essential parts of public key infrastructure is the ability to efficiently check the
certificate status and quickly distribute certificates revocation information. The existing …

Cryptorevocate: A cryptographic accumulator based distributed certificate revocation list

I Ozcelik, A Skjellum - 2021 IEEE 11th Annual Computing and …, 2021 - ieeexplore.ieee.org
Verification of the certificate revocation status is a crucial process for Public Key
Infrastructure (PKI) system reliability. Failing to detect a revoked certificate may lead to …

Revocation mechanisms for blockchain applications: A review

FR Vidal, N Ivaki, N Laranjeiro - 2021 10th Latin-American …, 2021 - ieeexplore.ieee.org
Nowadays, blockchain has been adopted by applications that are beyond cryptocurrencies.
In such applications, the data generated or transactions executed are likely to be altered …

Security analysis of a blockchain network

NB Bhat - 2020 - search.proquest.com
Blockchains have gained popularity due to their versatility and wide range of application.
Blockchains are a decentralized data structure guaranteeing integrity and non-repudiation of …

Design, modeling, and simulation of secure X. 509 certificate revocation

S Medury - 2023 - scholar.utc.edu
TLS communication over the internet has risen rapidly in the last seven years (2015--2022),
and there were over 156M active SSL certificates in 2022. The state-of-the-art Public Key …

[图书][B] Algorithms and Architectures for Parallel Processing: 21st International Conference, ICA3PP 2021, Virtual Event, December 3–5, 2021, Proceedings, Part II

Y Lai, T Wang, M Jiang, G Xu, W Liang, A Castiglione - 2022 - books.google.com
The three volume set LNCS 13155, 13156, and 13157 constitutes the refereed proceedings
of the 21st International Conference on Algorithms and Architectures for Parallel Processing …