參考文獻 |
[1] “Cisco Annual Internet Report (2018–2023) White Paper,” Cisco.Com. [online].
Available: https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.html. Accessed: Jul. 15,
2023.
[2] “Streaming claims largest piece of TV viewing pie in July,” Nielsen.Com. [online].
Available: https://www.nielsen.com/insights/2022/streaming-claims-largest-piece-of-tvviewing-pie-in-july/. Accessed: Jul. 13, 2023.
[3] M. N. M. Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture
and Security,” in IEEE Access, vol. 9, pp. 61048-61073, 2021, doi:
10.1109/ACCESS.2021.3072849.
[4] J. Li, A. Grintsvayg, J. Kauffman and C. Fleming, “LBRY: A Blockchain-Based
Decentralized Digital Content Marketplace,” 2020 IEEE International Conference on
Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 2020, pp. 42-51,
doi: 10.1109/DAPPS49028.2020.00005.
[5] A. Dixit, A. Singh, Y. Rahulamathavan and M. Rajarajan, “FAST DATA: A Fair, Secure,
and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain,” in IEEE
Internet of Things Journal, vol. 10, no. 4, pp. 2934-2944, 15 Feb.15, 2023, doi:
10.1109/JIOT.2021.3120640.
[6] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B. Sikdar, “A Survey on IoT
Security: Application Areas, Security Threats, and Solution Architectures,” in IEEE
Access, vol. 7, pp. 82721-82743, 2019, doi: 10.1109/ACCESS.2019.2924045.
[7] M. Saad et al., “Exploring the Attack Surface of Blockchain: A Comprehensive Survey,”
in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1977-2008,
thirdquarter 2020, doi: 10.1109/COMST.2020.2975999.
[8] L. -Y. Yeh, N. -X. Shen and R. -H. Hwang, “Blockchain-Based Privacy-Preserving and
Sustainable Data Query Service Over 5G-VANETs,” in IEEE Transactions on Intelligent
Transportation Systems, vol. 23, no. 9, pp. 15909-15921, Sept. 2022, doi:
10.1109/TITS.2022.3146322.
[9] L. Breidenbach, C. Cachin, B. Chan, A. Coventry, S. Ellis, A. Juels, F. Koushanfar, A.
Miller, B. Magauran, D. Moroz, et al., Chainlink 2.0: Next steps in the evolution of
decentralized oracle networks, Chainlink Labs.
[10] L. -Y. Yeh, C. -Y. Shen, W. -C. Huang, W. -H. Hsu and H. -C. Wu, “GDPR-Aware
Revocable P2P File-Sharing System Over Consortium Blockchain,” in IEEE Systems
Journal,vol. 16, no. 4, pp. 5234-5245, Dec. 2022, doi: 10.1109/JSYST.2021.3139319.
[11] M. Li, L. Zeng, L. Zhao, R. Yang, D. An and H. Fan, “Blockchain-Watermarking for
Compressive Sensed Images,” in IEEE Access, vol. 9, pp. 56457-56467, 2021, doi:
10.1109/ACCESS.2021.3072196.
[12] S. Ghimire, J. Y. Choi and B. Lee, “Using Blockchain for Improved Video Integrity
Verification,” in IEEE Transactions on Multimedia, vol. 22, no. 1, pp. 108-121, Jan.
2020, doi: 10.1109/TMM.2019.2925961.
[13] Z. Shahbazi and Y. -C. Byun, “Fake Media Detection Based on Natural Language
Processing and Blockchain Approaches,” in IEEE Access, vol. 9, pp. 128442-128453,
2021, doi: 10.1109/ACCESS.2021.3112607.
[14] Y. Liu, F. R. Yu, X. Li, H. Ji and V. C. M. Leung, “Decentralized Resource Allocation for
Video Transcoding and Delivery in Blockchain-Based System With Mobile Edge
Computing,” in IEEE Transactions on Vehicular Technology, vol. 68, no. 11, pp. 11169-
11185, Nov. 2019, doi: 10.1109/TVT.2019.2937351.
[15] X. Jiang, F. R. Yu, T. Song and V. C. M. Leung, “Intelligent Resource Allocation for
Video Analytics in Blockchain-Enabled Internet of Autonomous Vehicles With Edge
Computing,” in IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14260-14272, 15 Aug.15, 2022, doi: 10.1109/JIOT.2020.3026354.
[16] M. Zhang, J. Cao, Y. Sahni, Q. Chen, S. Jiang and L. Yang, “Blockchain-based
Collaborative Edge Intelligence for Trustworthy and Real-Time Video Surveillance,” in
IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1623-1633, Feb. 2023,
doi: 10.1109/TII.2022.3203397.
[17] B. Jiang, Q. He, P. Liu, S. Maharjan and Y. Zhang, “Blockchain Empowered Secure
Video Sharing With Access Control for Vehicular Edge Computing,” in IEEE
Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2023.3269058.
[18] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Decentralized Business
Review, 2008, 21260.
[19] J. Benet, Ipfs-content addressed, versioned, p2p file system, arXiv preprint
arXiv:1407.3561.
[20] D. Schmelz, G. Fischer, P. Niemeier, L. Zhu, and T. Grechenig, “Towards using public
blockchain in information-centric networks: Challenges imposed by the european
union’s general data protection regulation,” in Proc. 1st IEEE Int. Conf. Hot Inf.-Centric
Netw., 2018, pp. 223–228.
[21] D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” 2018,
arXiv:1906.11078.
[22] A. Sahai and B. Water, “Fuzzy identity-based encryption,” in Proc. Annu. Int. Conf. Theory
Appl Cryptographic Techn. Adv. Cryptol.- Eurocrypt, 2005, pp. 457–473.
[23] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for finegrained access control of encrypted data,” in Proceedings of the 13th ACM conference
on Computer and communications security, in CCS ’06. New York, NY, USA:
Association for Computing Machinery, Oct. 2006, pp. 89–98. doi:
10.1145/1180405.1180418.
[24] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.
[25] C. Fan, V. S. Huang, and H. Ruan, “Arbitrary-state attribute-based encryption with
dynamic membership,” IEEE Transactions on Computers, vol. 63, no. 8, pp. 1951–1961,
Aug 2014.
[26] C. -I. Fan, Y. -F. Tseng and C. -C. Feng, "CCA-Secure Attribute-Based Encryption
Supporting Dynamic Membership in the Standard Model," 2021 IEEE Conference on
Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan, 2021,
pp. 1-8, doi: 10.1109/DSC49826.2021.9346247.
[27] M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography,
in: International conference on the theory and applications of cryptographic techniques,
Springer, 1998, 127–144.
[28] Adi Shamir. 1979. How to Share a Secret. Commun. ACM 22, 11 (nov 1979), 612–613.
https://doi.org/10.1145/359168.359176.
[29] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in
Advances in Cryptology — CRYPTO 2001, J. Kilian, Ed. Berlin, Heidelberg: Springer
Berlin Heidelberg, 2001, pp. 213–229.
[30] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Advances in
Cryptology – EUROCRYPT 2011, K. G. Paterson, Ed. Berlin, Heidelberg: Springer
Berlin Heidelberg, 2011, pp. 568–588.
[31] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and
provably secure realization,” in Public Key Cryptography – PKC 2011, D. Catalano, N.
Fazio, R. Gennaro, and A. Nicolosi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
2011, pp. 53–70.
[32] A. Beimel, “Secure schemes for secret sharing and key distribution,” Ph.D. dissertation,
Israel Institute of Technology, Technion, Haifa, Israel, 1996. |