|
Bibliography [1]Dong He et al., “Fintech and Financial Services: Initial Considerations,” International Monetary Fund, 2017. [2]Marko Jakšič1 and Matej Marinč2, “The Future of Banking: The Role of Information Technology,” Forthcoming in Bančni vestnik: Banging Scetor at the Crossroads: Challenges for the Future,2015. [3]Hoang Giang Do and Wee Keong Ng, “Blockchain-Based System for Secure Data Storage with Private Keyword Search,” 2017 IEEE World Congress on Services (SERVICES), 2017, pp. 90 - 93. [4]Prakash Chandra Mondal, Rupam Deb, and Mohammad Nurul Huda, “Know Your Customer (KYC) Based Authentication Method for Financial Services through the Internet,” 2016 19th International Conference on Computer and Information Technology (ICCIT), 2016, pp. 535 - 540. [5]Prakash Chandra Mondal, Rupam Deb, and Mohammad Nurul Huda, “Transaction Authorization from Know Your Customer (KYC) Information in Online Banking,” 2016 9th International Conference on Electrical and Computer Engineering (ICECE), 2016, pp. 523 - 526. [6]Martin Schaffer and Peter Schartner, “Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability,” International Conference on Smart Card Research and Advanced Applications, 2006, pp. 206-221 [7]Ilya Sukhodolskiy and Sergey Zapechnikov, “A Blockchain-Based Access Control System for Cloud Storage,” 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2018, pp. 1575 - 1578. [8]Debiao He et al., “Certificateless Public Key Authenticated Encryption with Keyword Search for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, 2017, pp. 3618 – 3627. [9]Hironao Takahashi, Shinji Nakano, and Uzair Lakhani, “SHA256d Hash Rate Enhancement by L3 Cache,” 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018, pp. 849 – 850. [10]Pinyaphat Tasatanattakool and Chian Techapanupreeda, “Blockchain: Challenges and Applications” 2018 International Conference on Information Networking (ICOIN), 2018, pp. 473 – 475. [11]Qi Liu and Kenli Li, “Decentration Transaction Method Based on Blockchain Technology,” 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), 2018, pp. 416 - 419. [12]Yongle Chen, Hui Li, Kejiao Li, and Jiyang Zhang, “An Improved P2P File System Scheme Based on IPFS and Blockchain,” 2017 IEEE International Conference on Big Data (Big Data), 2017, pp. 2652 - 2657. [13]Michele D'Aliessi, ”How Does the Blockchain Work? ,” https://medium.com/s/story/how-does-the-blockchain-work-98c8cd01d2ae, 2016. [14]Ari Juels and Burton S. Kaliski Jr, “PORs: Proofs of Retrievability for Large Files,” in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584-597. [15]Satoshi Nakamoto, “Bitcoin: A Peer-to-peer Electronic Cash System,” https://bitcoin.org/bitcoin.pdf, 2008. [16]Gavin Wood, “Ethereum: A Secure Decentralized Generalized Transaction ledger,” Ethereum Project Yellow Paper, 2014. [17]Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli, “A Survey of Attacks on Ethereum Smart Contracts,” International Conference on Principles of Security and Trust, pp. 164-186, 2017. [18]Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia, “Dissecting Ponzi Schemes on Ethereum: Identification, Analysis, and Impact,” arXiv preprint, 2017. [19]Elli Androulaki et al., “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” EuroSys 2018 conference, 2018. [20] Mohammad Wazid, Sherali Zeadally, and Ashok Kumar Das, “Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions,” IEEE Consumer Electronics Magazine, vol. 8, no. 2, 2019, pp. 56 - 60. [21]Jiin-Chiou Cheng et al., “Blockchain and Smart Contract for Digital Certificate,” 2018 IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 1046 - 1051. [22]Woo Young Moon and Soo Dong Kim, “A Payment Mediation Platform for Heterogeneous FinTech Schemes,” 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016, pp. 511 - 516. [23]Sara Rouhani and Ralph Deters, “Performance Analysis of Ethereum Transactions in Private Blockchain,” 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017, pp. 70 - 74. [24]Eli Ben Sasson et al., “Zerocash: Decentralized Anonymous Payments from Bitcoin”, 2014 IEEE Symposium on Security and Privacy, 2014, pp. 459 - 474. [25]Chun I Fan et al., “Anonymous Credential Scheme Supporting Active Revocation,” 2014 Ninth Asia Joint Conference on Information Security, 29 January, 2014, pp. 127 - 132. [26]Ruhui Ma et al., “EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 3, 12 June, 2015, pp. 372 - 383. [27]Jiazhi Li and Lei Zhang, “Attribute-Based Keyword Search and Data Access Control in Cloud,” 2014 Tenth International Conference on Computational Intelligence and Security, 2014, pp. 382 - 386. [28] Zhiquan Lv, Min Zhang, and Dengguo Feng, “Multi-User Searchable Encryption with Efficient Access Control for Cloud Storage,” 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, 2014, pp. 366 - 373. [29]Zhirong Shen, Jiwu Shu, and Wei Xue, “Keyword Search With Access Control Over Encrypted Cloud Data,” IEEE Sensors Journal, vol. 17, no. 3, 2016, pp. 858 - 868. [30]Qiang Tang “Nothing is for Free: Security in Searching Shared and Encrypted Data,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, 2014, pp. 1943 - 1952. [31]Yong Ho Hwang et al., “Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services,” 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 140 - 147. [32]Jian Li, Ruhui Ma, and Haibing Guan, “TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud,” IEEE Transactions on Cloud Computing, vol. 5, no. 1, 2015, pp. 126 - 139. [33] Ence Zhou et al., “Security Assurance for Smart Contract,” 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, pp. 2157-4960. [34] Yao Ma and Jinjuan Feng, “Evaluating Usability of Three Authentication Methods in Web-Based Application,” 2011 Ninth International Conference on Software Engineering Research, Management and Applications, 2011, pp. 978 – 1028.
|