| IoT | Internet of Things |
| IP | Internet Protocol |
| TCP | Transmission Control Protocol |
| UDP | User Datagram Protocol |
| P2P | Peer-to-Peer |
| SPI | Serial Peripheral Interface |
| IGMP | Internet Group Management Protocol |
| ICMP | Internet Control Message Protocol |
| REST | Representational State Transfer |
| DDP | Distributed Data Protocol |
| OSPF | Open Shortest Path First |
| IGP | Interior Gateway Protocol |
| AS | Autonomous System |
| WSN | Wireless Sensor Network |
| RFID | Radio Frequency Identification |
| PoW | Proof of Work |
| PoS | Proof of Stake |
| DPoS | Delegated Proof of Stake |
| TaPoS | Transactions as Proof of Stake |
| BFT | Byzantine Fault Tolerance |
| PBFT | Practical Byzantine Fault Tolerance |
| DBFT | Delegated BFT |
| PoA | Proof of Authority |
| PoSV | Proof-of-Stake-Velocity |
| PoP | Proof-of-Personhood |
| PoB | Proof of Bandwidth |
| PoET | Proof of Elapsed Time |
| SCP | Stellar Consensus Protocol |
| PKC | Public Key Cryptography |
| PKC | Public Key Cryptography |
| THS | Threshold signature |
| TPS | Transactions Per Second |
| PoV | Proof of Vote |
| PoT | Proof-of-Trust |
| LSB | Lightweight Scalable Blockchain |
| ELIB | Efficient Lightweight integrated Blockchain |
| SGD | Stochastic Gradient Descent |
| LSB | Least Significant Bit |
| IPFS | InterPlanetary File System |
| DTC | Distributed Time-based |
| ECC | Elliptic Curve Cryptography |
| PDA | Personal Digital Assistance |
| IHM | IoT Health Manager |
| DAG | Directed Acyclic Graph |
| CV | Cardinal Value |
| DV | Data Validity |
| CD | Contact Degree |
| ACC | Access Control Contract |
| JC | Judge Contract |
| DTM | Distributed Throughput Management |
| CH | Cluster Head |
| OBMs | Overlay Block Managers |
| DAC | Discretionary Access Control Models |
| MAC | Mandatory Access Control Model |
| MSP | Membership Service Provider |
| JCC | JointCloud Computing |
| JCCE | JointCloud Collaboration Environment |
| DO | Data Owner |
| KGC | Key Generate Center |
| ACL | Access Control List |
| ECIES | Elliptic Curve Integrated Encryption Scheme |
| MLNCML | Mixed Linear and Nonlinear Spatiotemporal Chaotic Systems |
| PEP | Policy Enforcement Point |
| CCBCM | Consortium Blockchain Manager |
| AEBCM | Aggregated Edge Blockchain Manager |
| EBCMs | Edge Blockchain Managers |
| PoEoI | Proof-of-Epidemiology-of-Interest |
| IHT | Information Hiding Techniques |
| SSI | Self-Sovereign Identity |
| VC | Verifiable Credential |
| DID | Decentralized ID |
| ABAC | Attribute-based Access Control |
| RBAC | Role-based Access Control |
| DSMAC | Decentralized Self-Management of data Access Control |
| ICN | Information-Centric Networking |
| IBE | Identity-Based Encryption |
| PRE | Proxy Re-encryption |
| ZK-SNARKs | Zero-Knowledge Succinct Non-Interactive Argument of Knowledge |