Computer Science ›› 2020, Vol. 47 ›› Issue (3): 281-286.doi: 10.11896/jsjkx.190300086
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
XU Chong-jian,LI Xian-feng
CLC Number:
[1]TRELEAVEN P,BROWN R G,YANG D.Blockchain Techno- logy in Finance[J].Computer,2017,50(9):14-17. [2]BECK,ROMAN.Beyond Bitcoin:The Rise of Blockchain World[J].Computer,2018,51(2):54-58. [3]TAPSCOTT D,TAPSCOTT A.Blockchain revolution:how the technology behind bitcoin is changing money,business,and the world[M].Penguin,2016. [4]CROSBY M,PATTANAYAK P,VERMA S,et al.Blockchain technology:Beyond bitcoin[J].Applied Innovation,2016,2(6-10):71. [5]ZHENG Z,XIE S,DAI H,et al.An overview of blockchain technology:Architecture,consensus,and future trends[C]∥2017 IEEE International Congress on Big Data (BigData Congress).IEEE,2017:557-564. [6]LACITY M C.Addressing key challenges to making enterprise blockchain applications a reality[J].MIS Quarterly Executive,2018,17(3):201-222. [7]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]∥2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).IEEE,2017:1-3. [8]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186. [9]BOGNER A,CHANSON M,MEEUW A.A decentralised sharing app running a smart contract on the ethereum blockchain[C]∥Proceedings of the 6th International Conference on the Internet of Things.ACM,2016:177-178. [10]LIAO K,ZHAO Z,DOUPÉ A,et al.Behind closed doors:mea- surement and analysis of CryptoLocker ransoms in Bitcoin[C]∥2016 APWG Symposium on Electronic Crime Research (eCrime).IEEE,2016:1-13. [11]WU J X,GAO Y,ZHANG Z Y,et al.A Multi-Party Privacy Preserving Fair Contract Signing Protocol based on Blockchains[J].Journal of Cyber Security,2018,3(3):13-21. [12]RUFFING T,MORENO-SANCHEZ P,KATE A.CoinShuffle:Practical decentralized coin mixing for Bitcoin[C]∥European Symposium on Research in Computer Security.Springer,Cham,2014:345-364. [13]ZIEGELDORF J H,GROSSMANN F,HENZE M,et al.Coin- party:Secure multi-party mixing of bitcoins[C]∥Proceedings of the 5th ACM Conference on Data and Application Security and Privacy.ACM,2015:75-86. [14]BISSIAS G,OZISIK A P,LEVINE B N,et al.Sybil-resistant mixing for bitcoin[C]∥Proceedings of the 13th Workshop on Privacy in the Electronic Society.ACM,2014:149-158. [15]SNOW P,DEERY B,LU J,et al.Factom business processes secured by immutable audit trails on the blockchain[OL].https://www.factom.com/wp-content/uploads/2018/10/Factom_Whitepaper_v1.2.pdf. [16]HOU Y B,LIANG X,ZHAN X Y.Block Chain Based Architecture Model of Electronic Evidence System[J].Computer Science,2018,v.45(S1):361-364. [17]HUANG X F,XU L,YANG X.Blockchain Model of Cloud Forensics[J].Journal of Beijing University of Posts and Telecom, 2017,40(6):120-124. [18]AZARIA A,EKBLAW A,VIEIRA T,et al.Medrec:Using blockchain for medical data access and permission management[C]∥International Conference on Open and Big Data (OBD).IEEE,2016:25-30. [19]XING S M,FENG W,WANG Q J.Research on Anti-Lost Scheme of Confidential Files Based on BlockChain Technology[J].Journal of Information Security Research,2017(10):22-30. [20]XUE T F,FU Q C,WANG C,et al.A Medical Data Sharing Model via Blockchain[J].Acta Automatica Sinica,2017(9):73-80. [21]XIA Q I,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-less medical data sharing among cloud service providers via blockchain[J].IEEE Access,2017,5:14757-14767. [22]WU Z Q,LIANG Y H,KANG J W,et al.Secure data storage and sharing system based on consortium blockchain in smart grid[J].Journal of Computer Applications,2017,37(10):2742-2747. [23]TANG C M,GAO L.Multi-parties Key Agreement Protocol in Block Chain[J].Netinfo Security,2017,17(12):17-21. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[3] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[4] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[5] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[6] | ZHOU Yi-hua, JIA Yu-xin, JIA Li-yuan, FANG Jia-bo, SHI Wei-min. Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree [J]. Computer Science, 2021, 48(9): 330-336. |
[7] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[8] | YAN Kai-lun, ZHANG Ji-lian. Model Chain for Data and Model Sharing [J]. Computer Science, 2021, 48(2): 311-316. |
[9] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[10] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[11] | CHEN Xian-lai, ZHAO Xiao-yu, ZENG Gong-mian, AN Ying. Online Patient Communication Model Based on Blockchain [J]. Computer Science, 2021, 48(11): 28-35. |
[12] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[13] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[14] | YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71. |
[15] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
|