Computer Science ›› 2020, Vol. 47 ›› Issue (1): 315-320.doi: 10.11896/jsjkx.190100195
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
ZHOU Wan-kai1,LONG Min1,2
CLC Number:
[1]LI J Z,GAO H.Survey on Sensor Network Research [J].Jour-nal of Computer Research and Development,2008,45(1):1-15. [2]HARJITO B.Kolmogorov watermarking technique for secure the data of Wireless Sensor Networks[C]∥2017 Second International Conference on Informatics and Computing (ICIC).IEEE,2017:1-6. [3]MUNSYI M,SUDARSONO A,RASYID M U H A.Secure data sensor access using attribute-based encryption for environmental monitoring[C]∥2017 International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC).IEEE,2017:59-64. [4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].https:/bitcoin.org//bitcoin.pdf. [5]JUN,MYUNGSAN.Blockchain government-a next form of infrastructure for the twenty-first century[J].Journal of Open Innovation:Technology,Market,and Complexity,2018,4(1):7. [6]HOLBL,MARKO,KOMPARAM,et al.A Systematic Review of the Use of Blockchain in Healthcare[J].Symmetry,2018,10(10):470. [7]ZHANG Z,ZHAO L.A Design of Digital Rights Management Mechanism Based on Blockchain Technology[C]∥International Conference on Blockchain.Cham:Springer,2018:32-46. [8]REYNAA,MARTIN,CRISTIAN,et al.On blockchain and its integration with IoT.Challenges and opportunities[J].Future Generation Computer Systems,2018,88:173-190. [9]BINY,JAROD W,SURYA N,et al.IoTChain:Establishing Trust in the Internet of Things Ecosystem Using Blockchain[J].IEEE Cloud Computing,2018,5(4):12-23. [10]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [11]AZARIA A,EKBLAW A,VIEIRA T,et al.Medrec:Using blockchain for medical data access and permission management[C]∥2016 2nd International Conference on Open and Big Data (OBD).Los Alamitos,CA,USA,IEEE,2016:25-30. [12]TOYODA K,MATHIOPOULOS P T,SASASE I,et al.A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in The Post Supply Chain[J].IEEE Access,2017,5:17465-17477. [13]GAO J,ASAMOAH K O,SIFAH E B,et al.GridMonitoring:Secured Sovereign Blockchain Based Monitoring on Smart Grid[J].IEEE Access,2018,6(99):9917-9925. [14]MAO D,HAO Z,WANG F,et al.Novel Automatic Food Trading System Using Consortium Blockchain[J].Arabian Journal for Science and Engineering,2019,44(4):3439-3455. [15]BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing[C]∥International Conference on the Theory and Application of Cryptology and Information Security.New York:Springer-Verlag,2001:514-532. [16]CASTRO M,LISKOV B.Practical Byzantine fault tolerance and proactive recovery[J].ACM Transactions on Computer Systems (TOCS),2002,20(4):398-461. [17]ZHANG F,SAFAVINAINI R,SUSILO W.An Efficient Signa-ture Scheme from Bilinear Pairings and Its Applications[J].Lecture Notes in Computer Science,2004,2947(39):277-290. [18]CHEN Z,CHEN S,XU H,et al.A security authentication scheme of 5G ultra-dense network based on block chain[J].IEEE Access,2018,6:55372-55379. [19]WANG Y,CAI S,LIN C,et al.Study of Blockchains’s Consensus Mechanism Based on Credit[J].IEEE Access,2019,7:10224-10231. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[8] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | LI Xiao-dong, YU Zhi-yong, HUANG Fang-wan, ZHU Wei-ping, TU Chun-yu, ZHENG Wei-nan. Participant Selection Strategies Based on Crowd Sensing for River Environmental Monitoring [J]. Computer Science, 2022, 49(5): 371-379. |
[14] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[15] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
|