Computer Science ›› 2022, Vol. 49 ›› Issue (5): 325-332.doi: 10.11896/jsjkx.210900075
• Information Security • Previous Articles Next Articles
YANG Zhen, HUANG Song, ZHENG Chang-you
CLC Number:
[1]HOWE J.The Rise of Crowdsourcing[J].Wired,2006,14(6):1-4. [2]ZHANG X F,FENG Y,LIU D,et al.Research Progress ofCrowdsourced Software Testing[J].Journal of Software,2018,29(1):69-88. [3]FENG J H,LI G L,FENG J H.A Survey on Crowdsourcing[J].Chinese Journal of Computers,2015,38(9):1713-1726. [4]NAGAI Y,UCHIDA Y,SAKAZAWA S,et al.Digital watermarking for deep neural networks[J].International Journal of Multimedia Information Retrieval,2018,7(1):3-16. [5]ZHANG Z,ZHAO L.A design of digital rights management mechanism based on blockchain technology[C]//International Conference on Blockchain.Cham:Springer,2018:32-46. [6]LU Y,TANG Q,WANG G.Zebralancer:Private and anonymous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).Vienna:IEEE Press,2018:853-865. [7]SUN Z,WANG Y,CAI Z,et al.A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing[J].International Journal of Intelligent Systems,2021,36(5):2058-2080. [8]GUO J,LI C,ZHANG G,et al.Blockchain-enabled digital rights management for multimedia resources of online education[J].Multimedia Tools and Applications,2020,79(15):9735-9755. [9]XU Q D.Design and Implementation of Multimedia ContentCopyright Protection System on Android Platform[D].Beijing:Beijing University of Posts and Telecommunications,2014. [10]HUANG Q L,MA Z F,FU J Y,et al.Privacy-preserving digital rights management scheme in cloud computing[J].Journal on Communications,2014,35(2):95-103. [11]LU Y,TANG Q,WANG G.Zebralancer:Private and anony-mous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).IEEE,2018:853-865. [12]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].[2009-03-24].https://bitcoin.org/bitcoin.pdf. [13]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy (SP’07).Berkeley:IEEE Press,2007:321-334. [14]GAO J X,SUN J M,QIN J.Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation.Journal of Computer Research and Development[J].Journal of Computer Research and Development,2019,56(10):2160-2169. [15]BANERJEE S,BERA B,DAS A K,et al.Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT[J].Computer Communications,2021,169:99-113. [16]GUAN Z,LU X,YANG W,et al.Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid[J].Journal of Parallel and Distributed Computing,2021,147:34-45. [17]MA X X,HUANG Y.Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Univers[J].Computer Science,2020,47(S1):420-423. [18]DAEMEN J,RIJMEN V.The design of Rijndael:AES-the advancedencryption standard[M]// Springer Science & Business Media.India:Springer,2013. [19]HAN X,YUAN Y,WANG F Y.Security Problems on Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2019,45(1):206-225. [20]BENET J.IPFS-Content Addressed,Versioned,P2P File System[EB/OL][2014-07-14].https://arxiv.org/pdf/1407.3561.pdf. [21]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006:89-98. [22]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//EuroSys’18:Proceedings of the thirteenth EuroSys conference.New York:Association for Computing Machinery,2018:1-15. [23]YIN H,XIONG Y,DENG T,et al.A privacy-preservingandidentity-based personalized recommendation scheme for encryp-ted tasks in crowdsourcing[J].IEEE Access,2019,7:138857-138871. |
[1] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[8] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[9] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|