Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 391-394.doi: 10.11896/JsJkx.191000051
• Information Security • Previous Articles Next Articles
ZHANG Qi-wen, WANG Zhi-qiang and ZHANG Yi-qian
CLC Number:
[1] BENTOV I,LEE C,MIZRAHI A,et al.Proof of Activity:Extending Bitcoin’s Proof of Work via Proof of Stake .Acm Sigmetrics Performance Evaluation Review,2014,42(3):34-37. [2] LI W,ANDREINA S,BOHLI J M,et al.Securing proof-of-stake blockchain protocols//Data Privacy Management,Cryptocurrencies and Blockchain Technology.Springer,Cham,2017:297-315. [3] RAJENDRA S A,JIM B.Optimal block time for proof of work blockchains //Twenty-Sixth European Conference on Information Systems.2018. [4] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A Provably Secure Proof-of-Stake Blockchain Protocol//Annual International Cryptology Conference.Springer,Cham,2017. [5] LAMPORT L,SHOSTAK R,PEASE R.The Byzantine Generals Problem.ACM Transactions on Programming Languages and Systems (TOPLAS),1982,4(3):382-401. [6] CASTRO M,LISKOV B.Practical Byzantine fault tolerance//OSDI.1999:173-186. [7] LIU D H,YIN G,WANG H M,et al.Overview of Gossip Algorithm in Distributed Environment.Computer Science,2010,37(11):24-28. [8] ZHANG S J,CHAI J,CHEN Z H,et al.Byzantine Consensus Algorithm Based on Gossip Protocol.Computer Science,2018,45(2):20-24. [9] BOYD S,GHOSH A,PRABHAKAR B,et al.Randomized gossip algorithms.IEEE Transactions on Information Theory,2006,52(6):2508-2530. [10] LEE S,NEDIC′ A.Asynchronous Gossip-Based Random ProJection Algorithms Over Networks.IEEE Transactions on Automatic Control,2013,61(4):953-968. [11] LOIZOU N,RABBAT M,RICHTRIK P.Provably accelerated randomized gossip algorithms//2019 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP).IEEE,2019:7505-7509. [12] SILVESTRE D,ROSA P,HESPANHA J P,et al.Stochastic and deterministic fault detection for randomized gossip algorithms.Automatica,2017,78(Complete):46-60. [13] AYSAL T C,YILDIZ M E,SARWATE A D,et al.Broadcast Gossip Algorithms for Consensus.IEEE Transactions on Signal Processing,2009,57(7):2748-2761. [14] USTEBAY D,ORESHKIN B N,COATES M J,et al.Greedy Gossip With Eavesdropping.IEEE Transactions on Signal Processing,2010,58(7):3765-3776. [15] SARWATE A D,DIMAKIS A G.The Impact of Mobility on Gossip Algorithms.IEEE Transactions on Information Theo-ry It,2012,58(3):1731-1742. [16] NEWPORT C,WEAVER A.Random Gossip Processes in Smartphone Peer-to-Peer Networks.arXiv:1902.02763,2019. [17] HANZELY F,KONECˇNY J,LOIZOU N,et al.Privacy preserving randomized gossip algorithms.arXiv:1706.07636,2017. [18] TUNCER C,AYSAL M E,YILDIZ A D,et al.Broadcast gossip algorithms: Design and analysis for consensus//2008 47th IEEE Conference on Decision and Control.IEEE,2009. |
[1] | WEN Xiao-lin, LI Chang-lin, ZHANG Xin-yi, LIU Shang-song, ZHU Min. Visual Analysis Method of Blockchain Community Evolution Based on DPoS Consensus Mechanism [J]. Computer Science, 2022, 49(1): 328-335. |
[2] | YAN Kai-lun, ZHANG Ji-lian. Model Chain for Data and Model Sharing [J]. Computer Science, 2021, 48(2): 311-316. |
[3] | DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508. |
[4] | CHEN Xian-lai, ZHAO Xiao-yu, ZENG Gong-mian, AN Ying. Online Patient Communication Model Based on Blockchain [J]. Computer Science, 2021, 48(11): 28-35. |
[5] | FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311. |
[6] | CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275. |
[7] | ZHANG Chang-gui, ZHANG Yan-feng, LI Xiao-hua, NIE Tie-zheng, YU Ge. Survey of New Blockchain Techniques:DAG Based Blockchain and Sharding Based Blockchain [J]. Computer Science, 2020, 47(10): 282-289. |
[8] | WANG Hui, ZHOU Ming-ming. Medical Information Security Storage Model Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 174-179. |
[9] | HU Zhao-peng, DING Wei-ping, GAO Zhan, ZHU Xiao-hui, WANG Jie-hua. Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 180-185. |
[10] | CAO Kang-hua, DONG Wei-wei, WANG Jin-liang, ZHOU Lin, WANG Yong. Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet [J]. Computer Science, 2019, 46(11A): 455-459. |
[11] | LIANG He-jun, HAN Jing-ti. Research on Decentralized Transaction Consensus Mechanism of Cloud Computing Resources Based on Block Chain [J]. Computer Science, 2019, 46(11A): 548-552. |
[12] | QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian. Blockchain Based Secure Storage Scheme of Dynamic Data [J]. Computer Science, 2018, 45(2): 57-62. |
[13] | BI Ya, ZHOU Bei, LENG Kai-jun and WANG Cun-fa. Public Blockchain of Pharmaceutical Business Resources Based on Double-chain Architecture [J]. Computer Science, 2018, 45(2): 40-47. |
[14] | ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24. |
[15] | MA Xue-bin,ZHANG Yan-wen,OUYANG Zhen-chao and WANG Li-ting. Message Transmission System for Opportunistic Networks [J]. Computer Science, 2013, 40(Z11): 41-45. |
|