Computer Science ›› 2019, Vol. 46 ›› Issue (4): 129-136.doi: 10.11896/j.issn.1002-137X.2019.04.021
• Information Security • Previous Articles Next Articles
WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun
CLC Number:
[1]LI X,JIANG P,CHEN T,et al.A Survey on the security of blockchain systems[J].Future Generation Computer Systems,2017,9(5):147-154. [2]BABAIOFF M,DOBZINSKI S,OREN S,et al.On Bitcoin and red balloons[J].Acm Sigecom Exchanges,2011,10(3):5-9. [3]Hyper Ledger.Hyper Ledger architecture working group paper[EB/OL].[2017-11-10].https://hyperledeger.org/. [4]HUANG B,LIU Z,CHEN J,et al.Behavior pattern clustering in blockchain networks[J].Multimedia Tools & Applications,2017,76(19):1-12. [5]CHEN L,MORRISSEY P,SMART N P,et al.Security Notions and Generic Constructions for Client Puzzles[C]∥International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Springer-Verlag,2009:505-523. [6]STEBILA D,KUPPUSAMY L,RANGASAMY J,et al.Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols[M]∥Topics in Cryptology- CT-RSA 2011.2011:284-301. [7]CHEN R C,GUO W J,TANG L Y,et al.Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks[J].Journal of Software,2009,20(9):2558-2573. [8]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[OL].http://bitcoin.org/bitcoin.pdf. [9]WANG Z Y,LI B,ZHANG H G.Research on Security of Hash Funtions[J].Computer Engineering and Applications,2005,41(12):18-19.(in Chinese) 王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. [10]ZHANG Z X,DU Y J,LI B,et al.Self-defence model of SIP proxy server for against Dos attack[J].Journal on Communications,2009,30(4):93-99.(in Chinese) 张兆心,杜跃进,李斌,等.SIP代理服务器抗拒绝服务攻击自防御模型[J].通信学报,2009,30(4):93-99. [11]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186. [12]LIU M D,SHI Y J.Remote Attestation Model Based on Blockchain[J].Computer Science,2018,45(2):48-52.(in Chinese) 刘明达,拾以娟.基于区块链的远程证明模型[J].计算机科学,2018,45(2):48-52. [13]Underwood S.Blockchain beyond bitcoin[M].ACM,2016. [14]LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14. [15]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7. [16]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494. |
[1] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[5] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[6] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[7] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[8] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[9] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[10] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[11] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[12] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[13] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[14] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[15] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
|