Computer Science ›› 2018, Vol. 45 ›› Issue (2): 57-62.doi: 10.11896/j.issn.1002-137X.2018.02.010
Previous Articles Next Articles
QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian
[1] NING H S,XU Q Y.Research on Global Internet of Things’ Developments and it’s Lonstruction in China[J].Acta Electro-nica Sinica,2010,8(11):2590-2599.(in Chinese) 宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,8(11):2590-2599. [2] HOU J J,BAI Y.Research on the Shortage of Internet ofThings Standards——Take the Development of Key Technical Standards as an Example[J].Science & Technology Progress and Policy,2015,2(12):61-66.(in Chinese) 侯俊军,白杨.物联网标准供给不足问题研究——以关键技术标准发展为例[J].科技进步与对策,2015,2(12):61-66. [3] WEN C X,LIANG L.Suggestions on Effective Application of Continuous Internal Audit[J].Enterprise Economy,2010,6(4):155-157.(in Chinese) 温彩秀,梁蕾.企业内部审计中有效应用持续审计的建议[J].企业经济,2010,6(4):155-157. [4] FENG D G,ZHANG M,ZHANG Y,et al.Study on Cloud Computing Security[J].Journal of Software,2011,2(1):71-83.(in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. [5] SHAN D H,SHI Y C,ZHAO W T,et al.Segmented Fusion Fuzzy Clustering Algorithm for Cloud Data Security Storage[J].Computer Science,2017,44(5):166-169,188.(in Chinese) 单冬红,史永昌,赵伟艇,等.面向云数据安全存储的分段融合模糊聚类算法[J].计算机科学,2017,44(5):166-169,188. [6] LIU T T.Research on Key Technologies of Data Securitytowards Cloud Computing[D].Zhengzhou:PLA Information Engineering University,2013.(in Chinese) 刘婷婷.面向云计算的数据安全保护关键技术研究[D].郑州:解放军信息工程大学,2013. [7] HE M,CHEN G H,LIANG W H,et al.Cloud Data Storage Security and Privacy Protection Policies under IoT Environment[J].Computer Science,2012,39(5):62-65,90.(in Chinese) 何明,陈国华,梁文辉,等.物联网环境下云数据存储安全及隐私保护策略研究[J].计算机科学,2012,9(5):62-65,90. [8] ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,7(6):1328-1348.(in Chinese) 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,7(6):1328-1348. [9] LAI Y P,WU W F.The defense in-depth approach to the protection for browsing users against drive-by cache attacks[J].Security and Communication Networks,2015,8(7):1422-1430. [10] ARCHER J.Top Threats to Cloud Computing V1.0[EB/OL].http://wenku.baidu.com/view/db3506ea81c758f5f61f67e5.html. [11] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,2(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,2(4):481-494. [12] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org /bitcoin.pdf,2008. [13] FAN J,YI L T,SHU J W.Research on the technologies of Byzantine system[J].Journal of Software,2013,24(6):1346-1360.(in Chinese) 范捷,易乐天,舒继武.拜占庭系统技术研究综述[J].软件学报,2013,4(6):1346-1360. [14] PASS R,SEEMAN L,SHELAT A.Analysis of the Blockchain Protocol in Asynchronous Networks[C]∥Advances in Crypto-logy-EUROCRYPT.Berlin:Springer,2017:643-673. [15] GARAY J A,KIAYIAS A,LEONARDOS N.The Bitcoin Backbone Protocol:Analysis and Applications [C]∥Advances in Cryptology-EUROCRYPT.Berlin:Springer,2015:281-310. [16] EYAL I,GENCDER A E,RENESSE R V.Bitcoin-NG:a scalable blockchain protocol[C]∥Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59. [17] FANNING K,CENTERS D P.Blockchain and its coming impact on financial services[J].Journal of Corporate Accounting & Finance,2016,27(5):53-57. [18] PINZN C,ROCHA C.Double-spend Attack Models with Time Advantange for Bitcoin[J].Electronic Notes in Theoretical Computer Science,2016,329(12):79-103. [19] 杨宝华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:9-19. [20] GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems,2017,9:1-20. |
No related articles found! |
|