[1] Yu X.,Yan Z.,Vasilakos A.V. .2017 .A Survey of Verifiable Computation. Mobile Networks and Application, 22 : 438-453.
[2] Nakamoto S. .2024 .Bitcoin: A peer-to-peer electronic cash system (. pdf (accessed 10 February, : .
[3] Crosby M.,Pattanayak P.,Verma S.,Kalyanaraman V. .2016 .Blockchain technology: Beyond bitcoin. Applied Innovation, 2 : 6-10.
[4] Šimunić S.,Bernaca D.,Lenac K. .2021 .Verifiable computing applications in blockchain. IEEE Access, 9 : 156729-156745.
[5] Dorsala M.R.,Sastry V.N.,Chapram S. .2021 .Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications, 196 : 103246.
[6] Gamage H.,Weerasinghe H.,Dias N. .2020 .A survey on blockchain technology concepts, applications, and issues. SN Computer Science, 1 : 1-15.
[7] Soni S.,Bhushan B. .2019 .A comprehensive survey on blockchain: working, security analysis, privacy threats and potential applications. India (July 5-6, 1 : 922-926.
[8] Shi S.,He D.,Li L.,Kumar N.,Khan M.K.,K.K. R. Choo M.K. .2020 .Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security, 97 : 101966.
[9] Peng L.,Feng W.,Yan Z.,Li Y.,Zhou X.,Shimizu S. .2021 .Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks, 7 : 295-307.
[10] M.R. Ahmed ,A.K.M.M. Islam S.,Shatabda S.,Islam S. .2022 .Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access, 10 : 113436-113481.
[11] Li W.,Wu J.,Cao J.,Chen N.,Zhang Q.,Buyya R. .2021 .Blockchain-Based Trust Management in Cloud Computing Systems: A Taxonomy, Review and Future Directions. Journal of Cloud Computing, 35(1) : .
[12] A.M.S. Saleh .2024 .Blockchain for Secure and Decentralized Artificial Intelligence in Cybersecurity: A Comprehensive Review. Blockchain: Research and Applications, 5 : 100193.
[13] M.M. Memon M.A.,Hashmani F.T.,Simpao A.C.,Sales N.Q.,Santillan D.,Khan D. .2023 .Blockchain in Healthcare: A Comprehensive Survey of Implementations and a Secure Model Proposal. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 60(3) : 1-13.
[14] Rosenfeld M. .2024 .Overview of colored coins (. (accessed 10 February, : .
[15] M. Conoscenti A.,Vetro A.,C. De Martin A. .2016 .Blockchain for the internet of things: A systematic literature review. Morocco (November 29 - December 2, : 1-6.
[16] Wang S.,Ouyang L.,Yuan Y.,Ni X.,Wang F.Y. .2019 .Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49 : 2266-2277.
[17] Gai K.,Guo J.,Zhu L.,Yu S. .2020 .Blockchain meets cloud computing: A survey. IEEE Communications Surveys Tutorials, 22 : 2009-2030.
[18] D.C. Nguyen P.N.,Pathirana M.,Ding M.,Seneviratne A. .2020 .Blockchain for 5g and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166 : 102693.
[19] Zafar F.,Khan A.,Malik S.U.R.,Ahmed M.,Anjum A.,Khan M.I.,Javed N.,Alam M.,Jamil F. .2017 .A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security, 65 : 29-49.
[20] C. Dong Y.,Wang A.,Aldweesh P.,McCorry P.,A. van Moorsel P. .2017 .Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. USA (30 October - 3 November, : 211-227.
[21] Benisi N.Z.,Aminian M.,Javadi B. .2020 .Blockchainbased decentralized storage networks: A survey Journal of Network. Computer Applications, 162 : 102656.
[22] Kumaresan R.,and I. Bentov. R. .2014 .How to use bitcoin to incentivize correct computations. USA (November 3-7, : 30-41.
[23] C. Yang L.,Tan N.,Shi B.,Xu Y.,Cao K.,Yu. AuthPrivacyChain K. .2020 .A blockchain-based access control framework with privacy protection in cloud. IEEE Access, 8 : 70604-70615.
[24] Zhang Y.,Deng R.H.,Liu X.,Zheng D. .2018 .Blockchain based eficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462 : 262-277.
[25] Zhang Y.,Deng R.H.,Liu X.,Zheng D. .2018 .Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing, 14 : 1152-1166.
[26] Wang S.,Wang Y.,Y. Zhang. Y. .2019 .Blockchainbased fair payment protocol for deduplication cloud storage system. IEEE Access, 7 : 127652-127668.
[27] M. Krol and I.,Psaras and I. .2018 .Secure payments for outsourced computations. , 06462 : .
[28] Hjlmarsson F.,Hreiarsson G.K.,Hamdaqa M.,Hjlmtsson G. .2018 .Blockchain-based e-voting system. USA (July 2-7, : 983-986.
[29] J. Eberhardt S.,Tai S.,NS S. .2018 .Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax. Canada (July 30 - August 3, : 1084-1091.
[30] Jiang S.,Liu J.,Wang L.,Yoo S.M. .2019 .Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In ICC 2019-2019 IEEE International Conference on Communications (ICC), : 1-6.
[31] M.R. Dorsala V.,Sastry S.,Chapram S. .2020 .Fair payments for verifiable cloud services using smart contracts. Computers & Security, 90 : 101712.
[32] Zhou L.,Wang Y.,Sun Y. .2018 .Mistore: a blockchainbased medical insurance storage system. Journal of Medical Systems, 42 : 1-17.
[33] Avizheh S.,Nabi M.,Safavi-Naini R. .2019 .Venkateswarlu K. Verifiable computation using smart contracts. UK (November, 11 : 17-28.
[34] J. Teutsch C.,Reitwießner C. .2019 .A scalable verification solution for blockchains. , 04756 : .
[35] C. Yang X.,Chen Y.,Xiang Y. .2018 .Blockchainbased publicly verifiable data deletion scheme for cloud storage. Journal of Network and Computer Applications, 103 : 185-193.
[36] M. Li L.,Zhu Z.,Zhang C.,Lal M.,Conti M.,Alazab M. .2021 .Anonymous and verifiable reputation system for e-commerce platforms based on blockchain. IEEE Transactions on Network and Service Management, 18 : 4434-4449.
[37] J. Zawistowski P.,Janiuk A.,Regulski A.,Skrzypczak A.,Leverington P.,Bylica M.,Franciszkiewicz P.,Peregud A.,Banasiak M.,Stasiewicz R.,Zagórowicz R. .2023 .. com/62446d07873fde065cbcb8d5/62 446d07873fdeb626bcb927_Golemwhitepaper.pdf (accessed 30 December, : .
[38] He H.,Lodygensky O.,Alves E. .2023 .. pdf (accessed 30 December, : .
[39] .2023 .Supercomputer organized by network mining (. (accessed 30 December, : .
[40] Ghani M.A.N.U.,She K.,Rauf M.A.,Alajmi M.,Ghadi Y.Y.,Algarni. Securing Synthetic A. .2024 .Faces: A GAN-Blockchain Approach to PrivacyEnhanced Facial Recognition. Journal of King Saud University-Computer and Information Sciences, 102036(4) : .
[41] Ghani M.A.N.U.,She K.,Rauf M.A.,Khan S.,Khan J.A.,Aldakheel E.A.,Khafaga D.S. .2024 .Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies. Materials & Continua, 2610(2) : .
[42] A.H. Magsi L.V.,Yovita Z.,Ali Z. .2023 .A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking. Sustainability, 10931(14) : .