Computer Science ›› 2023, Vol. 50 ›› Issue (8): 365-371.doi: 10.11896/jsjkx.220900049
• Information Security • Previous Articles
WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan
CLC Number:
[1]KUZNETSOV A,LUTSENKO M,KUZNETSOVA K,et al.Statistical Testing of Blockchain Hash Algorithms[C]//CMiGIN.2019:67-79. [2]WANG J S,LI L L,YAN Y,et al.Security Incidents and Solutions of Blockchain Technology Application[J].Computer Science,2018,45(6A):352-355. [3]NERURKAR P,PATEL D,BUSNEL Y,et al.Dissectingbitcoin blockchain:Empirical analysis of bitcoin network[J].Journal of Network and Computer Applications,2021,177:102940. [4]RAMAN R K,VARSHNEY L R.Distributed storage meets secret sharing on the blockchain[C]//2018 Information Theory and Applications Workshop(ITA).IEEE,2018:1-6. [5]BACH L M,MIHALJEVIC B,ZAGAR M.Comparative analysis of blockchain consensus algorithms[C]//2018 41st International Convention on Information and Communication Technology,Electronics and Microelectronics(MIPRO).2018:1545-1550. [6]LEPORE C,CERIA M,VISCONTI A,et al.A survey on blockchain consensus with a performance comparison of PoW,PoS and pure PoS[J].Mathematics,2020,8(10):1782. [7]XIE M,LIAO Z,HUANG L.Data Security Based on Blockchain Digital Currency[C]//2020 3rd International Conference on Smart BlockChain(SmartBlock).IEEE,2020:5-10. [8]SCHÄR F.Decentralized finance:On blockchain-and smart contract-based financial markets[J].FRB of St.Louis Review,2021,103(2):153-174. [9]DIALLO E,DIB O,ZEMA N R,et al.When Proof-of-Work(PoW) based blockchain meets VANET environments[C]//2021 12th International Conference on Information and Communication Systems(ICICS).IEEE,2021:336-343. [10]ALDRIGHETTI A,CANAVARI M,HINGLEY M K.A Delphi Study on Blockchain Application to Food Traceability[J].International Journal on Food System Dynamics,2021,12(1):6-18. [11]LIU Q,SONG B Y,JI W T,et al.Research on malicious attack model of blockchain multi-mining pools [J].Journal of Frontiers of Computer Science & Technology,2021:1-11. [12]YIU N C K.An Overview of Forks and Coordination in Blockchain Development[J].arXiv:2102.10006,2021. [13]MIN X P,LI Q Z,KONG L J,et al.License chain multi-center dynamic consensus mechanism[J].Chinese Journal of Compu-ters,2018,41(5):1005-1020. [14]JIA D Y,XIN J C,WANG Z Q,et al.Blockchain storage capacity scalable model[J].Journal of Frontiers of Computer Science &Technology,2018,12(4):525-535. [15]FADHIL M,OWENSON G,ADDA M.A bitcoin model forevaluation of clustering to improve propagation delay in bitcoin network[C]//2016 IEEE International Conference on Computational Science and Engineering(CSE).IEEE,2016:468-475. [16]MEI H,GAO Z,GUO Z,et al.Storage mechanism optimization in blockchain system based on residual number system[J].IEEE Access,2019,7:114539-114546. [17]WANG J L,LIU Q,SONG B Y.Research on the Optimization Model of Blockchain Hierarchical Proxy[J].IEEE Access,2021,9:144327-144340. |
[1] | DU Ming, YANG Wen, ZHOU Junfeng. Maximum Influential Community Search in Heterogeneous Information Network [J]. Computer Science, 2023, 50(8): 16-26. |
[2] | WANG Xu, WU Yanxia, ZHANG Xue, HONG Ruize, LI Guangsheng. Survey of Rotating Object Detection Research in Computer Vision [J]. Computer Science, 2023, 50(8): 79-92. |
[3] | XING Linquan, XIAO Yingmin, YANG Zhibin, WEI Zhengmin, ZHOU Yong, GAO Saijun. Spacecraft Rendezvous Guidance Method Based on Safe Reinforcement Learning [J]. Computer Science, 2023, 50(8): 271-279. |
[4] | ZHU Pengzhe, YAO Yuan, LIU Zijing, XI Ruicheng. Compiler-supported Program Stack Space Layout Runtime Randomization Method [J]. Computer Science, 2023, 50(8): 314-320. |
[5] | XUE Yuanzhou, YANG Shuo, MAO Xinjun. Adjoint Observation Schemes and Software Implementation Framework for Autonomous Robots [J]. Computer Science, 2023, 50(7): 1-9. |
[6] | DU Hao, WANG Yunchao, YAN Chenyu, LI Xingwei. Test Cases Generation Techniques for Root Cause Location of Fault [J]. Computer Science, 2023, 50(7): 10-17. |
[7] | LIU Ziwen, YU Lijuan, SU Yixing, ZHAO Yao, SHI Zhu. Test Case Generation Based on Web Application Front-end Behavior Model [J]. Computer Science, 2023, 50(7): 18-26. |
[8] | CHEN Zhifei, HAO Yang, CHEN Lin, XIAO Liang. Rule-based Technique for Detecting Risky Dynamic Typing Code [J]. Computer Science, 2023, 50(7): 27-37. |
[9] | WANG Mingxia, XIONG Yun. Disease Diagnosis Prediction Algorithm Based on Contrastive Learning [J]. Computer Science, 2023, 50(7): 46-52. |
[10] | SHAN Xiaohuan, SONG Rui, LI Haihai, SONG Baoyan. Event Recommendation Method with Multi-factor Feature Fusion in EBSN [J]. Computer Science, 2023, 50(7): 60-65. |
[11] | WEI Sen, ZHOU Haoran, HU Chuang, CHENG Dazhao. Implementation and Optimization of Apache Spark Cache System Based on Mixed Memory [J]. Computer Science, 2023, 50(6): 10-21. |
[12] | YU Ting, WANG Lisong, QIN Xiaolin. Lock-free Parallel Semi-naive Algorithm Based on Multi-core CPU [J]. Computer Science, 2023, 50(6): 29-35. |
[13] | LIU Renyu, XU Zhiqian, SHANG Honghui, ZHANG Yunquan. Study of Iterative Solution Algorithm of Response Density Matrix in Density Functional Perturbation Theory [J]. Computer Science, 2023, 50(6): 81-85. |
[14] | ZHANG Yaqing, SHAN Zhongyuan, ZHAO Junfeng, WANG Yasha. Intelligent Mapping Recommendation-based Knowledge Graph Instance Construction and Evolution Method [J]. Computer Science, 2023, 50(6): 142-150. |
[15] | ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306. |
|