1 |
Satoshi Nakamoto, Accessed on Nov. 23, 2018. [Online] Available: https://bitcoin.org/bitcoin.pdf
|
2 |
A look at blockchain technology, https://www.columnfivemedia.com/best-100-technology-infographics/technology-infographics-3
|
3 |
Joaao Sousa, Alysson Bessani, Marko Vukolicc, "A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform," https://fenix.tecnico.ulisboa.pt/downloadFile/282093452042936/alysson-bessani-2.pdf
|
4 |
HYPERLEDGER FABRIC, Accessed on Nov. 23, 2018. [Online] Available: https://hyperledger-fabric.readthedocs.io/en/release-1.3/
|
5 |
Jingjing Gu, Binglin Sun, Xiaojiang Du, Jun Wang, Yi Zhuang, Ziwang Wang, "Consortium Blockchain-based Malware Detection in Mobile Device," IEEE Access Vol.6, PP(99):1-1, 2018.
DOI
|
6 |
K. Christidis and M. Devetsikiotis, ''Blockchains and smart contracts for the Internet of Things,'' IEEE Access, Vol.4, pp. 2292-2303, 2016.
DOI
|
7 |
Blockverify, "Blockchain based Anti-Counterfeit Solution", Accessed on Nov. 23, 2018. [Online] Available: http://blockverify.io/,
|
8 |
SigmaLedger Team, "Challenges of Blockchain adoption for anti-counterfeit solution," Accessed on Nov. 23, 2018. [Online] Available: https://blog.sigmaledger.com/challenges-of-blockchain-adoption-for-anti-counterfeit-solution-8b53e1e18c23
|
9 |
StopTheFakes, "Blockchain Service Anti-Counterfeit & Copyright Infringement," Accessed on Nov. 23, 2018. [Online] Available: https://stopthefakes.io
|
10 |
Jiao Li, Gongqian Liang and Tianshi Liu, "A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication," KSII Transactions on Internet and Information Systems, Vol. 11, No. 8, pp.3766-3788, 2017. https://doi.org/10.3837/tiis.2017.08.001
DOI
|
11 |
Jingting Xue, Chunxiang Xu and Yuan Zhang, "Private Blockchain-Based Secure Access Control for Smart Home Systems," KSII Transactions on Internet and Information Systems, Vol.12, No.12, pp.6057-6078, 2018. https://doi.org/10.3837/tiis.2018.12.024
DOI
|
12 |
Yilin Ye, Lifa Wu, Zheng Hong and Kangyu Huang, "A Risk Classification Based Approach for Android Malware Detection," KSII Transactions on Internet and Information Systems, Vol.11, No.2, pp.959-981, 2017. https://doi.org/10.3837/tiis.2017.02.018
DOI
|
13 |
Xiaojian He, Ximeng Chen and Kangzi Li, "A Decentralized and Non-reversible Traceability System for Storing Commodity Data," KSII Transactions on Internet and Information Systems, Vol.13, No.2, pp.619-634, 2019. https://doi.org/10.3837/tiis.2019.02.008
DOI
|
14 |
VirusTotal Web site: https://www.virustotal.com/#/home/upload
|
15 |
Google Blocked 700,000 Malicious Apps From Play store in 2017. https://gbhackers.com/google-blocked-700000Apps
|
16 |
THE LINUX FOUNDATION PROJECTS, Hyperledger Project, https://www.hyperledger.org
|
17 |
IBM Developer, Let's code something amazing, https://developer.ibm.com
|
18 |
Blockchain, WIKIPEDIA, Accessed on Nov. 23, 2018. [Online] Available: https://en.wikipedia.org/wiki/Blockchain
|
19 |
Blockchain Web site: https://www.blockchain.com
|