Secure and Privacy-Preserving Data Computing Scheme Based on Blockchain for Double-Loop Governance of Smart Society
Abstract
References
Recommendations
Privacy-preserving computation of benchmarks on item-level data using RFID
WiSec '10: Proceedings of the third ACM conference on Wireless network securityCurrently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sensitive information is disclosed when sharing RFID data with other companies. ...
Achieving Corruption-Transparency in Service Governance Processes with Blockchain-Technology Based e-Participation
Web EngineeringAbstractCorruption takes place in public procurement by public servants through intermediaries due to the use of centralized systems and complicated processes. Blockchain and Web3 has the potential to remove these intermediaries, instead allowing ...
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
AbstractIncorporation of fog computing with low latency, preprocession (e.g., data aggregation) and location awareness, can facilitate fine-grained collection of smart metering data in smart grid and promotes the sustainability and efficiency of the grid. ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 125Total Downloads
- Downloads (Last 12 months)12
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format