TChain: A Privacy-Preserving Consortium Blockchain for Parking Charge Management
Abstract
References
Recommendations
A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium Blockchain
Smart Computing and CommunicationAbstractThe rising attention of deploying consortium blockchain in the industry has facilitated a wide scope of enterprise-level applications. In consortium blockchain, each participant’s identity needs to be verified before it joins the blockchain ...
Blockchain‐based privacy‐preserving valet parking for self‐driving vehicles
AbstractThe valet parking provides convenience for users and thus is becoming increasingly popular nowadays. However, this valet parking service incurs the risks of location information leakage and vehicle theft. To address these issues, in this paper, ...
We propose a blockchain‐based privacy‐preserving valet parking protocol called B‐park for self‐driving vehicles. The protocol guarantees the privacy of users while providing transparency and auditability of the service of valet parking. image image
Privacy preserving of trust management credentials based on trusted computing
ISPEC'10: Proceedings of the 6th international conference on Information Security Practice and ExperiencePrivacy disclosure of forward direction credentials and backward direction credentials is an important security defect in existing trust management systems. In this paper, a novel distributed privacy preserving scheme for trust management credentials is ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 116Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format