ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1906.09968
  4. Cited By
B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment
  atop Public Blockchain
v1v2 (latest)

B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain

21 June 2019
Mohamed Baza
Noureddine Lasla
Mohamed Mahmoud
Gautam Srivastava
M. Abdallah
ArXiv (abs)PDFHTML

Papers citing "B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain"

22 / 22 papers shown
Title
Data privacy for Mobility as a Service
Data privacy for Mobility as a Service
Zineb Garroussi
Antoine Legrain
Sébastien Gambs
Vincent Gautrais
B. Sansò
30
3
0
18 Sep 2023
Towards Cyber Security for Low-Carbon Transportation: Overview,
  Challenges and Future Directions
Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions
Yue Cao
Sifan Li
Chenchen Lv
Di Wang
Hongjian Sun
Jing Jiang
Fanlin Meng
Lexi Xu
Xinzhou Cheng
62
23
0
24 May 2023
Blockchain for the Cybersecurity of Smart City Applications
Blockchain for the Cybersecurity of Smart City Applications
O. Cheikhrouhou
Ichrak Amdouni
Khaleel W. Mershad
Maryem Ammi
Tuan Anh Nguyen Gia
66
10
0
06 Jun 2022
A Comprehensive Review on Blockchains for Internet of Vehicles:
  Challenges and Directions
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
Brian Hildebrand
Mohamed Baza
Tara Salman
Fathi H. Amsaad
Abdul Razaqu
Abdullah Alourani
97
48
0
21 Mar 2022
A Survey on Metaverse: Fundamentals, Security, and Privacy
A Survey on Metaverse: Fundamentals, Security, and Privacy
Yuntao Wang
Zhou Su
Ning Zhang
Rui Xing
Dongxiao Liu
Tom H. Luan
X. Shen
125
838
0
05 Mar 2022
A Comprehensive Survey on the Applications of Blockchain for Securing
  Vehicular Networks
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
Tejasvi Alladi
V. Chamola
Nishad Sahu
Vishnu Venkatesh
Adit Goyal
Mohsen Guizani
98
77
0
13 Jan 2022
Blockchain for Edge of Things: Applications, Opportunities, and
  Challenges
Blockchain for Edge of Things: Applications, Opportunities, and Challenges
Thippa Reddy Gadekallu
Quoc-Viet Pham
Praveen Dinh C. Nguyen
Kumar Reddy Maddikunta
Prabadevi B N Deepa
Praveen Kumar
P. Pathirana
Jun Zhao
Won Joo Hwang
79
123
0
11 Oct 2021
Security in Next Generation Mobile Payment Systems: A Comprehensive
  Survey
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
Waqas Ahmed
Amir Rasool
Neeraj Kumar
Faisal Shahzad
Thippa Reddy Gadekallu
Z. Jalil
A. R. Javed
93
46
0
25 May 2021
Attacks on a Privacy-Preserving Publish-Subscribe System and a
  Ride-Hailing Service
Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service
Srinivas Vivek
91
6
0
10 May 2021
SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic
  Attack (HIA) on Convolutional Neural Network (CNN)
SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN)
Tolulope A. Odetola
S. R. Hasan
AAML
163
8
0
16 Mar 2021
Finding the Sweet Spot for Data Anonymization: A Mechanism Design
  Perspective
Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective
Abdelrahman Eldosouky
Tapadhir Das
Anuraag Kotra
S. Sengupta
47
0
0
29 Jan 2021
Revisiting Driver Anonymity in ORide
Revisiting Driver Anonymity in ORide
D. Kumaraswamy
Shyam Murthy
Srinivas Vivek
112
5
0
16 Jan 2021
Blockchain-enabled Identity Verification for Safe Ridesharing Leveraging
  Zero-Knowledge Proof
Blockchain-enabled Identity Verification for Safe Ridesharing Leveraging Zero-Knowledge Proof
Wanxin Li
Collin Meese
Hao Guo
Mark M. Nejad
121
23
0
27 Oct 2020
Attribute-based Multi-Signature and Encryption for EHR Management: A
  Blockchain-based Solution
Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution
Hao Guo
Wanxin Li
E. Meamari
Chien-Chung Shen
Mark M. Nejad
53
37
0
25 Feb 2020
Practical Fast Gradient Sign Attack against Mammographic Image
  Classifier
Practical Fast Gradient Sign Attack against Mammographic Image Classifier
Ibrahim Yilmaz
AAML
81
10
0
27 Jan 2020
On Sharing Models Instead of Data using Mimic learning for Smart Health
  Applications
On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Mohamed Baza
A. Salazar
Mohamed Mahmoud
Mohamed M. Abdallah
Kemal Akkaya
82
18
0
24 Dec 2019
Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative
  Techniques
Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques
Ibrahim Yilmaz
Rahat Masum
131
14
0
10 Dec 2019
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping
  of Deep Learning Architecture (DLA) onto FPGA Boards
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping of Deep Learning Architecture (DLA) onto FPGA Boards
Tolulope A. Odetola
Katie M. Groves
S. R. Hasan
68
5
0
14 Nov 2019
A Scalable Multilabel Classification to Deploy Deep Learning
  Architectures For Edge Devices
A Scalable Multilabel Classification to Deploy Deep Learning Architectures For Edge Devices
Tolulope A. Odetola
Ogheneuriri Oderhohwo
S. R. Hasan
149
6
0
05 Nov 2019
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of
  Deep Learning Architectures: Input Interception Attack (IIA)
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)
Tolulope A. Odetola
Hawzhin Mohammed
S. R. Hasan
AAML
156
15
0
02 Nov 2019
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes
  for Smart Grid
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid
Mohamed Baza
Marbin Pazos-Revilla
Mahmoud Nabil
Ahmed B. T. Sherif
Mohamed Mahmoud
Waleed S. Alasmary
76
21
0
12 May 2019
Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Ahmed A. Shafee
Mohamed Baza
Douglas A. Talbert
M. Fouda
Mahmoud Nabil
Mohamed Mahmoud
77
29
0
02 May 2019
1