A Blockchain Scheme Based on DAG Structure Security Solution for IIoT.
Pengjie ZengXiaoliang WangLiangzuo DongXinhui SheFrank JiangPublished in: TrustCom (2021)
Keyphrases
- access control
- digital signature scheme
- network security
- ring signature scheme
- graph structure
- directed acyclic graph
- optimal solution
- authentication scheme
- authentication mechanism
- security analysis
- chosen plaintext
- directed acyclic
- learning automaton
- high security
- security mechanisms
- closed form
- intrusion detection
- probability distribution