Computer Science ›› 2019, Vol. 46 ›› Issue (12): 180-185.doi: 10.11896/jsjkx.181102170
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
HU Zhao-peng, DING Wei-ping, GAO Zhan, ZHU Xiao-hui, WANG Jie-hua
CLC Number:
[1]SARASWATHI S,YOGESH P.Secure and efficient Smart- Card-Based remote user authentication scheme formulti-server environment[J].Canadian Journal of Electrical and Computer Engineering,2015,38(1):20-30.[2]CHEN Y L,DU Y J,YANG G.Efficient attribute-based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154.(in Chinese) 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154.[3]ZHAO Y.Design of Dynamic Password Authentication System [J].Journal of Luoyang Normal University,2012,31(8):36-37.[4]LAMPORT L.Password authentication with insecure communication[J].Communication of the ACM,1981,24(11):770-772.[5]ASHISH K,HARI O.An improved and secure multiser- ver authentication scheme based on biometrics and smartcard[J].Digital Communications and Networks,2018,4(1):27-38.[6]ZHAN L,YAO G X,QIANG H C.Improved mutual authentication scheme based on smartcard for cloud computing[J].Computer Engineering and Design,2014,35(2):440-444.[7]XIONG L,JUNGUO L,JIAO Z,et al.A secure remote user mutual authentication scheme using smartcards [C]//Computers,Communications and IT Applications Conference.IEEE,2014:89-92.[8]JAEWOOK J,DONGHOON L,HAKJUN L,et al.Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card[J].Journal of Electronic Science and Technology,2018,16(1):45-49.[9]LI X,NIU J W,MA J,et al.Cryptanalysis and Impro- vement of a Biometric-based Remote UserAuthentication Scheme Using Smart Cards[J].Journal of Network and Computer Applications,2011,34(1):73-79.[10]QU J,PENG Y,TAN X L,et al.Anonymous Rem- ote User Authentication Scheme Based on Bioligical Features [J].Computer Engineering,2015,41(6):126-129,135.[11]YIN Q S,CHEN J H.Improved Identity Authentica-tion Protocol Based on Elliptic Curve Cryptography in Multiserver Environment [J].Computer Science,2018,45(6):111-116,150.[12]NAKAMOTOS.Bitcoin:apeer-to-peerelectron-iccashsystem [EB/OL].https://bitcoin.org/bitcoin.pdf.[13]工信部.中国区块链技术和应用发展白皮书 [R].北京:工信部,2016:23.[14]LIU A D,DU X H,WANG N,et al.Research progress of blockchain technology and its application in information security[J].Journal of Software,2018,29(7):2092-2115.[15]ZHOU Z C,LI L X,GUO S,et al.A biometrics and password two-factor crossdomain authentication scheme based on blockchaintechnology[J].Journal of Computer Applications,2018,38(6):100-107.[16]FROMKNECHT C,VELICANU D.CertCoin:A NameCoin based decentralized authentication system:Technical Report,6.857[R].Class Project,Massachusetts Institute of Technology,2014.[17]FROMKNECHT C,VELICANU D.Adecentralizpublic key infrastructure with identity retention:Technical Report,803[R].Massachusetts Institute of Technology,2014.[18]RAJU S,BODDEPALLI S,GAMPA S,et al.Identitymanagement using blockchain for cognitive cellular networks[C]//IEEE International Conference on Communications.IEEE,2017:1-6. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[3] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[4] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[5] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|