Computer Science ›› 2019, Vol. 46 ›› Issue (12): 138-147.doi: 10.11896/jsjkx.181202307
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun
CLC Number:
[1]KAMVAR,SEPANDAR D,SCHLOSSER,et al.The Eigen- Trust Algorithm for reputation management in P2P networks[J].Proceedings of the 12th international conference on World Wide Web,2003,12(1):640-651.[2]FAN X,LIU L,LI M,et al.EigenTrust++:Attack resilient trust management[C]//International Conference on Collaborative Computing:Networking,Applications and Worksharing.IEEE Computer Society,2012:416-425.[3]XIONG L,LIU L.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(7):843-857.[4]NISHIKAWA T,FUJITA S.A reputation management scheme for peer-to-peer networks based on the EigenTrust trustmana-gement algorithm[J].Journal of Information Processing,2012,20(3):578-584.[5]LU K,WANG J,LI M.An EigenTrust dynamic evolutionary model in P2P file-sharing systems[J].Peer-to-Peer Networking and Applications,2016,9(3):599-612.[6]ZHANG L,LIU J W,WANG R C,et al.Trust evaluation model based on improved D- S evidence theory[J].Journal on Communications,2013,34(7):167-173.(in Chinese) 张琳,刘婧文,王汝传,等.基于改进D-S证据理论的信任模型[J].通信学报,2013,34(7):167-173.[7]HAN Q W,REN M Y,WEN H.Topological potential based recommendation trust model for P2P communities system[J].Journal of Electronics and Information Technology,2015,37(6):1279-1284.(in Chinese) 韩祺祎,任梦吟,文红.基于拓扑势的P2P社区推荐信任模型[J].电子与信息学报,2015,37(6):1279-1284.[8]CHEN S S.Trust model based on weight factor in P2P network[J].Journal of Computer Applications,2013,33(6):1612-1614.(in Chinese) 陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013,33(6):1612-1614.[9]FANG Q,JI Y,WU G X,et al.Run length coding-based dyna- mic trust model for P2P network[J].Journal of Software,2009,20(6):1602-1616.(in Chinese) 方群,吉逸,吴国新,等.一种基于行程编码的P2P网络动态信任模型[J].软件学报,2009,20(6):1602-1616.[10]LIU Y C,LIANG Y H.Dynamic P2P trust model based on context factors[J].Journal on Communications,2016,37(8):34-45.(in Chinese) 刘义春,梁英宏.基于上下文因素的P2P动态信任模型[J].通信学报,2016,37(8):34-45.[11]YOU J,SHANG G J L,XU S K,et al.Distributed dynamic trust management model based on trust reliability[J].Journal of Software,2017,28(9):2354-2369.(in Chinese) 游静,上官经伦,徐守坤,等.考虑信任可靠度的分布式动态信任管理模型[J].软件学报,2017,28(9):2354-2369.[12]RITU,JAIN S.A trust model in cloud computing based on fuzzy logic[C]//IEEE International Conference on Recent Trends in Electronics.IEEE,2017,47-52.[13]LI H,MA X P,SHI J,et al.A recommendation model by means of trust transition in complex network environment[J].Acta Automatica Sinica,2018,44(2):363-376.(in Chinese) 李慧,马小平,施珺,等.复杂网络环境下基于信任传递的推荐模型研究[J].自动化学报,2018,44(2):363-376.[14]MENG X,LIU D.GeTrust:A guarantee-based trust model in Chord-based P2P networks[J].IEEE Transactions on Dependable & Secure Computing,2018,PP(99):54-68.[15]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [OL].https://bitcoin.org/.[16]DING W.Block chain based instrument data management system[J].China Instrumentation,2015,1(10):15-17.[17]Ethereum White Paper.A next-generation smart contract and decentralized application platform [OL].(2015-11-12).https://github.com/ethereum/wiki/wiki/WhitePaper.[18]TIAN J,DAI Y F.Study on durable peer-to-peer storage techniques[J].Journal of Software,2007,18(6):1379-1399.(in Chinese) 田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399.[19]CHEN Y,HUI L,LI K,et al.An improved P2P file system scheme based on IPFS and Blockchain[C]//IEEE International Conference on Big Data.IEEE,2018.[20]TIAN R H,LU X L,HOU M S,et al.P2P based distributed storage system[J].Computer Science,2007,34(6):47-48.(in Chinese) 田荣华,卢显良,侯孟书,等.P2P分布式存储系统[J].计算机科学,2007,34(6):47-48.[21]LI J,PENG Z,LI Y,et al.A data-check based distributed stora- ge model for storing hot temporary data[J].Future Generation Computer Systems,2017,73:13-21.[22]YANG L,HUANG H,LI R F,et al.Composite P2P storage system based on group management[J].Computer Science,2010,37(1):64-67.(in Chinese) 杨磊,黄浩,李仁发,等.一种基于分组管理的混合式P2P存储系统[J].计算机科学,2010,37(1):64-67.[23]NetLogo.NetLogo[EB/OL].http://ccl.northwestern.edu/ netlogo/index.shtml. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|