Computer Science ›› 2019, Vol. 46 ›› Issue (12): 155-164.doi: 10.11896/jsjkx.190300041
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
FAN Jian-feng1,2, LI Yi1, WU Wen-yuan1, FENG Yong1
CLC Number:
[1]CHEN G.The Software Design and Implementation of VPN Base Remote Monitoring System for Base Station[D].Chengdu:University of Eledronic Sicence and Technology of China,2017.(in Chinese) 陈刚.基于VPN的基站远程监控系统软件设计与实现[D].成都:电子科技大学,2017.[2]LUO C.ZTE E-Guard:Forerunner of security industry[J].China Public Security,2013(19):93-94.(in Chinese) 罗超.中兴力维:安防行业化的先行者[J].中国公共安全,2013(19):93-94.[3]YAN B Y,WANG L G,LI H.Application and technology innovation of China tower moving ring monitoring system [J].China New Telecommunications,2018,20(12):142-143.(in Chinese) 闫佰义,王联冠,李洪.中国铁塔动环监控系统的应用及技术创新[J].中国新通信,2018,20(12):142-143.[4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[M].Consulted,2008:24-26.[5]DONET J A D,PÉREZ-SOLA C,HERRERA-JOANCOMARTÍ J.The bitcoin P2P network[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:87-102.[6]STALLINGS W.Cryptography and network security:principles and practice[M].Upper Saddle River,NJ:Pearson,2017:743.[7]MATTILA J.The blockchain phenomenon-the disruptive potential of distributed consensus architectures[R].ETLA Working Papers,2016.[8]PETERS G W,PANAYI E.Understanding modern banking ledgers through blockchain technologies:Future of transaction processing and smart contracts on the internet of money[C]//Banking Beyond Banks and Money.Cham:Springer,2016:239-278.[9]CHRISTIAN D,SEIDEL J,WATTENHOFER R.Bitcoin meets strong consistency[C]//Proceedings of the 17th International Conference on Distributed Computing and Networking.ACM,2016.[10]EVANS D.Economic aspects of bitcoin and other decentralized public-ledger currency platforms[OL].http://www.law.uchicago.edu/Lawecon/index.html.[11]WOOD G.Ethereum:A secure decentralised generalised transaction ledger[J].Ethereum Project Yellow Paper,2014(151):1-32.[12]FABRIC-HYPERLEDGER H,HYPERLEDGER W G[OL].https://www.hyperledger.org/projects/fabric.[13]RIVEST R.The MD5 message-digest algorithm[R].1992.[14]EASTLAKE D,HANSEN T.US secure hash algorithms [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.[15]RIVEST R L,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key crypto systems.Communications of the ACM,1983,26(1):96-99.[16]JOHNSON D,MENEZES A,VANSTONE S.The elliptic curve digital signature algorithm[J].International Journal of Information Security,2001,1(1):36-63.[17]KRAVITZ D W.Digital signature algorithm[M].Washingto,USA:World Heritage Encyclopedia,1993.[18]CASTRO M,LISKOV B.Practical Byzantine fault tolerance [C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.1999:173-186.[19]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.IEEE,2017.[20]EASTLAKE D,HANSEN T.US secure hash algorithms (SHA and HMAC-SHA) [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.[21]GAN J,LI Q,CHEN Z,et al.Improvement research of Blockchain Practical Byzantine FaultTolerance Consensus Algorithm[J].Journal of Computer Applications,2019(9):1-10. 甘俊,李强,陈子豪,等.区块链实用拜占庭容错共识算法的改进研究[J].计算机应用,2019(9):1-10.[22]SANDHU,RAVI S.Role-based access control[J].Advances in Computers,1998,46:237-286.[23]MYERS M,ANKNEY R,MALPANI A,et al.X.509 Internet public key infrastructure online certificate status protocol-OCSP:RFC 6960[R].1999. |
[1] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[6] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[7] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[8] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[9] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[10] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[11] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[12] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[13] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[14] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[15] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
|