Skip to main content
. 2018 Aug 6;18(8):2575. doi: 10.3390/s18082575

Table 6.

Challenges Addressed by the Solution.

Confidentiality PriWatt [60]; Axon et al. [61]; Brody [64]; Cha et al. [65]
Dorri et al. [67,68]; Hardjono et al. [71]; IBM Hyperledger [75,76];
Munsing et al. [79]; Lombardi et al. [78]; Nehaï et al. [80];
Ouaddah et al. [81]; Shafagh et al. [85]; Storj [87]; Enigma [91,111]
Filament [59]; Vučinić et al. [104]; Guan et al. [105];
Mettler [108]; Haenni [98]; Davidsen et al. [99];
Schiener [94]; Wibson [95]; Niekerk et al. [97];
Authentication/ Filament [59]; PriWatt [60]; Axon et al. [61]; Brody [64];
Id-Management Slock.it [13]; Cha et al. [65]; CertCoin [69]; Ghuli et al. [70];
Hardjono et al. [71]; Hashemi et al. [72]; Huh et al. [74];
AuthCoin [77]; IBM Hyperledger [75,76]; Ouaddah et al. [81];
Shafagh et al. [85]; Enigma [91,111]; Wu et al. [102]; English [106]
Vučinić et al. [104]; Mettler [108]; Haenni [98]; Davidsen et al. [99];
Schiener [94]; Wibson [95]; Niekerk et al. [97];
Integrity Biswas et al. [63]; Dorri et al. [67,68]; IBM Hyperledger [75,76];
Lombardi et al. [78]; Ouaddah et al. [81]; Shafagh et al. [85]; Storj [87];
Xu et al. Sapphire [89]; Enigma [91,111]; IOTA (TANGLE) [82,83]
Mettler [108]; Haenni [98]; Davidsen et al. [99]; Chakraborty et al. [101];
Schiener [94]; Wibson [95]; Niekerk et al. [97]; Sagirlar et al. [100];
Availability Bahga et al. [62]; Brody [64]; Dorri et al. [67,68]; IBM Hyperledger [75,76];
Ruta [109]; Lombardi et al. [78]; Storj [87]; Enigma [91,111];
Mettler [108]; Haenni [98]; Davidsen et al. [99];
Schiener [94]; Wibson [95]; Niekerk et al. [97];
Non-repudiation TransActive Grid [10]; Slock.it [13]; PriWatt [60]; Axon et al. [61];
Bahga et al. [62]; Herbert et al. [73]; IBM Hyperledger [75,76];
Nehaï et al. [80]; Zhang et al. [90]; English [106]; Mettler [108];
Haenni [98]; Davidsen et al. [99]; Schiener [94]; Wibson [95];
Niekerk et al. [97];