Computer Science ›› 2023, Vol. 50 ›› Issue (1): 318-333.doi: 10.11896/jsjkx.211200042
• Information Security • Previous Articles Next Articles
LI Bei1, WU Hao2, HE Xiaowei1,2, WANG Bin2, XU Ergang1
CLC Number:
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic CashSystem[EB/OL].[2022-01-13].https://bitcoin.org/bitcoin.pdf. [2]TRELEAVEN P,BROWN R G,YANG D.Blockchain Techno-logy in Finance[J].Computer,2017,50(9):14-17. [3]THEODOULI A,ARAKLIOTIS S,MOSCHOU K,et al.On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing[C]//Proceedings of the 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.New York:IEEE,2018:1374-1379. [4]CHEN Y,DING S,XU Z,et al.Blockchain-Based Medical Records Secure Storage and Medical Service Framework[J].Journal of Medical Systems,2019,43(1):1-9. [5]ZHENG X,MUKKAMALA R R,VATRAPU R,et al.Block-chain Based Personal Health Data Sharing System Using Cloud Storage[C]//Proceedings of the 20th International Conference on e-Health Networking,Applications and Services.Ostrava:IEEE,2018:1-6. [6]CHEN J,WANG W,ZHOU Y,et al.Exploiting 5G and Blockchain for Medical Applications of Drones[J].IEEE Network,2021,35(1):30-36. [7]ALZAHRANI A G M,ALENEZI A,MERSHED A,et al.A Framework for Data Sharing Between Healthcare Providers Using Blockchain[C]//Proceedings of the 5th International Conference on Internet of Things,Big Data and Security.Prague:Scitepress,2020:349-358. [8]THWIN T T,VASUPONGAYYA S.Blockchain Based Secret-Data Sharing Model for Personal Health Record System[C]//Proceedings of the 5th International Conference on Advanced Informatics:Concept Theory and Applications.Krabi:IEEE,2018:196-201. [9]DWIVEDI A D,SRIVASTAVA G,DHAR S,et al.A Decentra-lized Privacy Preserving Healthcare Blockchain for IoT[J].Sensors,2019,19(2):326-343. [10]RATHEE G,SHARMA A,KUMAR R,et al.A Secure Communicating Things Network Framework for Industrial IoT Using Blockchain Technology[J].Ad Hoc Networks,2019,19(2):326-348. [11]LU Y,HUANG X,DAI Y,et al.Blockchain and FederatedLearning for Privacy Preserved Data Sharing in Industrial IoT[J].IEEE Transactions on Industrial Informatics,2019,16(6):4177-4186. [12]MANZOOR A,BRAEKEN A,KANHER E S S,et al.Proxy Re-Encryption Enabled Secure and Anonymous IoT Data Sharing Platform Based on Blockchain[EB/OL].[2022-01-13].https://doi.org/10.1016/j.jnca.2020.102917. [13]TURKANOVIC M,HOLBL M,KOSIC K,et al.EduCTX:ABlockchain Based Higher Education Credit Platform[J].IEEE Access,2018,6:5112-5127. [14]BHASKAR P,TIWARI C K,JOSHI A.Blockchain in Education Management:Present and Future Applications[J].Interactive Technology and Smart Education,2021,18(1):1-17. [15]HAN M,LI Z,HE J,et al.A Novel Blockchain-BasedEducation Records Verification Solution[C]//Proceedings of the 19th Annual SIG Conference on Information Technology Education.Fort Lauderdale:Association for Computing Machinery,2018:178-183. [16]FEDOROVA E P.Application of Blockchain Technology inHigher Education[J].European Journal of Contemporary Education,2020,9(3):552-571. [17]LO S K,XU X,CHIAM Y K,et al.Evaluating Suitability of Applying Blockchain[C]//Proceedings of the 2th International Conference on Engineering of Complex Computer Systems.Japan:IEEE,2017:158-161. [18]XIE J,YU F R,HUANG T,et al.A Survey on the Scalability of Blockchain Systems[J].IEEE Network,2019,33:166-173. [19]BENISI N Z,AMINIAN M,JAVADI B.Blockchain-BasedDecentralized Storage Networks:A Survey[EB/OL].[2022-01-13].https://doi.org/10.1016/j.jnca.2020.102656. [20]SUN X Z,ZHANG X,XIANG F,et al.Survey of storage sca-lability on blockchain[J].Journal of Software,2021,32(1):1-20. [21]WANG H,WANG L C,BAI X,et al.Research on key technology of blockchain privacy protection and scalability[J].Journal of Xidian University,2020,47(5):28-39. [22]Unconfirmed Transactions in Bitcoin[EB/OL].[2022-01-13].https://www.blockchain.com/btc/unco-nfirmed.transactions. [23]Blockchain.Blockchainsize[EB/OL].[2022-01-13].https://www.blockchain.com/charts/blocks-size. [24]Etherscan.Ethereum Fullnode Sync Chart[EB/OL].[2022-01-13].http://etherscan.io/chartsync/chaindefault. [25]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers,2018,41(5):969-988. [26]KARAGIANNIS T,BROIDO A,FALOUTSOS M,et al.Transport Layer Identification of P2P Traffic[C]//Proceedings of the 4th ACM SIGCOMM Conferenceon Internet Measurement.Kiev:IEEE Computer Soc.,2004:121-134. [27]XIA Q,DOU W S,GUO K W,et al.Survey on blockchain consensus protocol[J].Journal of Software,2021,32(2):277-299. [28]ZHENG Z,XIE S,DAI H,et al.An Overview of BlockchainTechnology:Architecture,Consensus,and Future Trends[C]//Proceedings of the IEEE International Congress on Big Data.Honolulu:IEEE,2017:557-564. [29]DATTANI J,SHETH H.Overview of Blockchain Technology[J].Asian Journal of Convergence in Technology,2019,5(1):1-3. [30]DASGUPTA D,SHREIN J M,GUPTA K D.A Survey ofBlockchain from Security Perspective[J].Journal of Banking and Financial Technology,2019,3(1):1-17. [31]TAYLOR P J,DARGAHI T,DEHGHANTANHA A,et al.A Systematic Literature Review of Blockchain Cyber Security[J].Digital Communications and Networks,2020,6(2):147-156. [32]MITANI T,OTSUKA A.Traceability in Permissioned Block-chain[J].IEEE Access,2020,8:21573-21588. [33]KAMBLE S S,GUNASEKARAN A,SHARAM R.Modelingthe Blockchain Enabled Traceability in AgricultureSupply Chain[EB/OL].[2022-01-13].https://doi.org/10.1016/j.ijinfomgt.2019.05.023. [34]AOKI Y,OTSUKI K,KANEKO T,et al.Simblock:A Blockchain Network Simulator[C]//Proceedings of the IEEE Confe-rence on Computer Communications Workshops.Seoul:IEEE,2019:325-329. [35]HOMOLIAK I,VENUGOPALAN S,REIJSBERGEN D,et al.The Security Reference Architecture for Blockchains:Toward a Standardized Model for Studying Vulnerabilities,Threats,and Defenses[J].IEEE Communications Surveys&Tutorials,2021,23:341-390. [36]KLARMAN U,BASU S,KUZMANOVIC A,et al.Bloxroute:AScalable Trustless Blockchain Distribution Network Whitepaper[EB/OL].[2022-01-13].https://bloxroute.com/wp-content/uploads/2019/11/bloXrouteWhitepaper.pdf. [37]OTSUKI K,BANNO R,SHUDO K.Quantitatively AnalyzingRelay Networks in Bitcoin[C]//Proceedings of the IEEE International Conference on Blockchain.Electr Network:IEEE,2020:214-220. [38]OTSUKI K,AOKI Y,BANNO R,et al.Effects of A Simple Relay Network on the Bitcoin Network[C]//Proceedings of the Asian Internet Engineering Conference.Phuket:Association for Computing Machinery,2019:41-46. [39]JOAN A D,CRISTINA P S,JORDI H.The bitcoin P2P net-work[C]//International Conference on Financial Cryptography and Data Security.Christ Church:Springer,2014:87-102. [40]DEMERS A,GREENE D,HOUSER C,et al.Epidemic Algorithms for Replicated Database Maintenance[J].ACM Sigops Operating Systems Review,1988,22:8-32. [41]CANETTI R,CHENG P C,PENDARAKIS D,et al.An Archi-tecture for Secure Internet Multicast[J].1998,22(3):195-199. [42]BHADRA S,SHAKKOTTAI S,GUPTA P.MinCost Selfish-Multicast With Network Coding[J].IEEE Transactions on Information Theory,2006,52(11):5077-5087. [43]FULLER R B.Nexus:A Peer-to-Peer Network[EB/OL].[2022-01-13].http://media.abnnewswire.net/media/ct/whitepaper/rpt/93416-Nexus_WhitePaper.pdf. [44]COELHO P,JUNIOR T C,BESSANI A,et al.Byzantine Fault Tolerant Atomic Multicast[C]//Proceedings of the IFIP International Conference on Dependable Systems and Networks.Lu-xembourg City:IEEE,2018:39-50. [45]KIM S K,MA Z.Measuring Ethereum Network Peers[C]//Proceedings of the Internet Measurement Conference.Boston:Association for Computing Machinery,2018:91-104. [46]GAO Y,SHI J,WANG X,et al.Topology Measurement andAnalysis on Ethereum P2P Network[C]//Proceedings of the IEEE Symposium on Computers and Communications.Barcelona:IEEE,2019:1-7. [47]LI X B,CHEN Y,ZHOU M Y,et al.Internet data transfer protocol quic:a survey[J].Journal of Computer Research and Development,2020,57(9):1864-1876. [48]LANGLEY A,RIDDOCH A,WILK A,et al.The Quic Transport Protocol:Design and Internet Scale Deployment[C]//Proceedings of the Conference of the ACM Special Interest Group on Data Communication.Ca:Association for Computing Machi-nery,2017:183-196. [49]TEAM H.Harmony:Technical Whitepaper[EB/OL].[2022-01-13].https://harmony.one/whitepaper.pdf. [50]ZHANG Z W,WANG G R,XU J L,et al.Survey on data ma-nagement in blockchain systems[J].Journal of Software,2020,31(9):2903-2925. [51]LUU L,NARAYANAN V,ZHENG C,et al.A Secure Sharding Protocol for Open Blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.Vienna:Association for Computing Machinery,2016:17-30. [52]KOKORIS K E,JOVANOVIC P,GASSER L,et al.Omnile-dger:A Secure,Scale-out,Decentralized Ledger via Sharding[C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy.Ca:IEEE,2018:583-598. [53]ZAMANI M,MOVAHEDI M,RAYKOVA M.Rapidchain:Scaling Blockchain via Full Sharding[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.Toronto:Association for Computing Machinery,2018:931-948. [54]YU B,LI X,ZHAO H.Virtual Block Group:A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table[J].The Computer Journal,2020,63(10):1524-1536. [55]CHEN H,WU H L,CHANG C C,et al.Light RepositoryBlockchain System with Multisecret Sharing for Industrial Big Data[EB/OL].[2022-01-13].https://doi.org/10.1155/2019/9060756. [56]AL B M,SONNINO A,BANO S,et al.Chainspace:A Sharded Smart Contracts Platform[J].arXiv:1708.03778,2017. [57]AHLSWEDE R,CAI N,LI S Y R,et al.Network Information Flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216. [58]DAI M,ZHANG S,WANG H,et al.A Low Storage Room Requirement Framework for Distributed Ledger in Blockchain[J].IEEE Access,2018,6:22970-22975. [59]QI X,ZHANG Z,JIN C,et al.A Reliable Storage Partition for Permissioned Blockchain[J].IEEE Transactions on Knowledge and Data Engineering,2020,33(1):14-27. [60]PERARD D,LACAN J,BACHY Y,et al.Erasure Code Based Low Storage Blockchain Node[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things.Halifax:IEEE,2018:1622-1627. [61]BUNZ B,KIFFER L,LUU L,et al.Flyclient:Super LightClients for Cryptocurrencies[C]//Proceedings of the IEEE Symposium on Security and Privacy.Electric Network:IEEE,2020:928-946. [62]ZHAO Y,NIU B,LI P,et al.A Novel Enhanced Lightweight Node for Blockchain[C]//Proceedings of the International Conference on Blockchain and Trustworthy Systems.Guangzhou:Springer,2019:137-149. [63]XU L,CHEN L,GAO Z,et al.EPBC:Efficient Public Block-chain Client for Lightweight Users[C]//Proceedings of the 1st Workshop on Scalable andResilient Infrastructures for Distributed Ledgers.Las Vegas:Association for Computing Machinery,2017:1-6. [64]FREY D,MAKKES M X,ROMAN P L,et al.Bringing Secure Bitcoin Transactions to Your Smartphone[C]//Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware.Trento:Association for Computing Machinery,2016:1-6. [65]CROMAN K,DECKER C,EYAL I,et al.On Scaling Decentra-lized Blockchains[C]//Proceedings of the International Confe-rence on Financial Cryptography and Data Security.US:Sprin-ger,2016:106-125. [66]EYAL I,GENCER A E,SIRERE E G,et al.Bitcoinng:A Scalable Blockchain Protocol[C]//Proceedings of the 13th Sympo-sium on Networked Systems Design and Implementation.Ca:Usenix Association,2016:45-59. [67]KUHRING L,ISTVAN Z,SORNIOTTI A,et al.Stream Chain:Rethinking Blockchain for Datacenters[J].arXiv:1808.08406v2,2018. [68]LEMAHIEU C.Nano:A Feeless Distributed CryptocurrencyNetwork[EB/OL].[2022-01-13].https://c-ontent.nano.org/whitepaper/Nano_Whitepaper_en.pdf. [69]CHURYUMOV A.Byteball:A Decentralized System for Sto-rage and Transfer of Value[EB/OL].[2022-01-13].https://obyte.org/Byteball.pdf. [70]ZHAO L,YU J.Evaluating DAG-Based Blockchains for IoT[C]//Proceedings of the 18th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Rotorua:IEEE,2019:507-513. [71]YANG W,DAI X,XIAO J,et al.LDV:A Lightweight Dag-Based Blockchain for Vehicular Social Networks[J].IEEE Transactions on Vehicular Technology,2020,69(6):5749-5759. [72]CUI L,YANG S,CHEN Z,et al.An Efficient and CompactedDAG-Based Blockchain Protocol for Industrial Internet of Things[J].IEEE Transactions on Industrial Informatics,2019,16(6):4134-4145. [73]LIU Y Z,LIU J Q,ZHANG C Y,et al.Overview on blockchain consensus mechanisms[J].Journal of Cryptologic Research,2019,6(4):395-432. [74]WANG H,WANG L C,BAI X,et al.Research on key technology of blockchain privacy protection and scalability[J].Journal of Xidian University,2020,47(5):28-39. [75]WANG R,ZHANG L,XU Q,et al.K-Bucket Based Raft Like Consensus Algorithm for Permissioned Blockchain[C]//Proceedings of the 25th International Conference on Parallel and Distributed Systems.Tianjin:IEEE,2019:996-999. [76]ZHANG Z,ZHU D,FAN W.QPBFT:Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified Role[C]//Proceedings of the 19th International Conference on Trust,Security and Privacy in Computing and Communications.Guangzhou:IEEE,2020:991-997. [77]PASS R,SHI E.Hybrid Consensus:Efficient Consensus in the Permissionless Model[J].Cryptology Eprint Archive,2017,91(39):1-16. [78]LIU X,HUANG H,XIAO F,et al.A Blockchain Based Trust Management with Conditional Privacy Preserving Announcement Scheme for Vanets[J].IEEE Internet of Things Journal,2019,7(5):4101-4112. [79]HUANG D Y,LI L,CHEN B,et al.RBFT:a new byzantinefault tolerant consensus mechanism based on raft cluster[J].Journal on Communications,2021,42(3):209-219. [80]HUANG J H,XIA X,LI Z C,et al.Proof of trust:mechanism of trust degree based on dynamic authorization[J].Journal of Software,2019,9:2593-2607. [81]XU Z Y,ZHOU X,et al.Survey on crosschain technology[J].Application Research of Computers,2021,38(2):341-346. [82]HERLIHY M.Atomic Cross-chain Swaps[C]//Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing.USA:Association for Computing Machinery,2018:245-254. [83]WOOD G.Polkadot:Vision for A Heterogeneous MultichainFramework[EB/OL].[2022-01-13].https://polkadot.network/PolkaDotPaper.pdf. [84]EYKHOLT E,MEREDITH L G,DENMAN J.Rchain Architecture Documentation[J].Retrieve Jan,2017,19:2019. [85]POON J,DRYJA T.The Bitcoin Lightning Network:Scalable Off-chain Instant Payments[EB/OL].[2022-01-13].https://lightning.network/lightning-network-paper.pdf. [86]BACK A,CORALLO M,DASHJR L,et al.Enabling Blockchain Innovations with Pegged Sidechains[J/OL].Sidechains,2014:72.https://www.doc88.com/p-0039741883052.html. [87]HARISHANKAR M,AKESTORIDIS D G,IYER S V,et al.PayPlace:Secure and Flexible Operator-Mediated Payments in Blockchain Marketplaces at Scale[EB/OL].[2022-01-13].https://arxiv.org/pdf/2003.06197.pdf. [88]POON J,BUTERIN V.Plasma:Scalable Autonomous SmartContracts[Z].White Paper,2017:1-47. [89]MAYMOUNKOV P,MAZIERES D,et al.Kademlia:A Peer-to-Peer Information System Based on the Xor Metric[C]//Proceedings of the International Workshop on Peer-to-Peer Systems.MA:Springer,2002:53-65. [90]ZYSKIND G,NATHAN O.Decentralizing Privacy:Using Block-chain to Protect Personal Data[C]//Proceedings of the 2015 IEEE Security and Privacy Workshops.Ca:IEEE,2015:180-184. [91]HASSANZADEH N Y,KUPCU A,OZKASAP O.LightChain:Scalable DHT-Based Blockchain[J].IEEE Transactions on Pa-rallel and Distributed Systems,2021,32(10):2582-2593. [92]LI R,SONG T,MEI B,et al.Blockchain for Largescale Internet of Things Data Storage and Protection[J].IEEE Transactions on Services Computing,2018,12(5):762-771. [93]HUANG C W,CHEN Y C.ZeroCalo:A Lightweight Blockchain Based on DHT Network[C]//Proceedings of the 2nd International Conference on Blockchain Technology and Applications.Xian:Association for Computing Machinery,2019:38-42. [94]HASAN S S,SULTAN N H,BARBHUIYA F A.Cloud Data Provenance Using IPFS and Blockchain Technology[C]//Proceedings of the Seventh International Workshop on Security in Cloud Computing.NewYork:IEEE,2019:5-12. [95]SHE W,HUO L,TIAN Z,et al.A Double Steganography Model Combining Blockchain and Interplanetary File System[J/OL].Peer-to-Peer Networking and Applications.https://link.sprin-ger.com/article/10.1007/s12083-021-01143-0. [96]YU Y,LIU S,YEOH P L,et al.LayerChain:A HierarchicalEdge Cloud Blockchain for Large-Scale Low-Delay Industrial Internet of Things Applications[J].IEEE Transactions on Industrial Informatics,2020,17(7):5077-5086. [97]YE H,PARK S.Reliable Vehicle Data Storage Using Block-chain and IPFS[J].Electronics,2021,10(10):1130. [98]KUMAR R,TRIPATHI R.Towards Design and Implementation of Security and Privacy Framework for Internet of Medical Things by Leveraging Blockchain and IPFS Technology[J].Journal of Supercomputing,2021,77(8):7916-7955. [99]XIE H,ZHANG Z,ZHANG Q,et al.HBRSS:Providing Highsecure Data Communication and Manipulationin Insecure Cloud Environments[J].Computer Communications,2021,174:1-12. [100]ZHANG G,YANG Z,XIE H,et al.A Secure Authorized Deduplication Scheme for Cloud Data Based on Blockchain[EB/OL].[2022-01-13].https://doi.org/10.1016/j.ipm.2021.102510. [101]TAO Q,CHEN Q,DING H,et al.Cross Department SecuresData Sharing in Food Industry via Blockchain Cloud Fusion Scheme[EB/OL].[2022-01-13].https://doi.org/10.1155/2021/6668339. [102]CHA J,SINGH S K,KIM T W,et al.Blockchain Empowered Cloud Architecture Based on Secret Sharing for Smart City[EB/OL].[2022-01-13].https://doi.org/10.1016/j.jisa.2020.102686. |
[1] | CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[8] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[14] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[15] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
|