Computer Science ›› 2025, Vol. 52 ›› Issue (11): 398-407.doi: 10.11896/jsjkx.241000169
• Information Security • Previous Articles Next Articles
LIU Zhanghui1,2, LIN Zhexu1,2, CHEN Hanlin1,2, MA Xinjian3,4, CHEN Xing1,2
CLC Number:
| [1]LUO C,MA Y,JING X,et al.Internet of data:a solution for dataspace infrastructure and its technical challenges [J].Big Data Research,2023,9(2):110-121. [2]ZHENG Z,XIE S,DAI H N,et al.Blockchain challenges and opportunities:A survey [J].International Journal of Web and Grid Services,2018,14(4):352-375. [3]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [J/OL].Decentralized Business Review,2008:21260.https://www.bitcoin.org/bitcoin.pdf. [4]CHEN H,PENDLETON M,NJILLA L,et al.A survey onethereum systems security:Vulnerabilities,attacks,and defenses [J].ACM Computing Surveys,2020,53(3):1-43. [5]DANIEL E,TSCHORSCH F.IPFS and friends:A qualitativecomparison of next generation peer-to-peer data networks [J].IEEE Communications Surveys & Tutorials,2022,24(1):31-52. [6]VASILE A,GUILLAUME S,AOUINI M,et al.Le Digital Object Identifier,une impérieuse nécessité? L'exemple de l'attribution de DOI à la Collection Pangloss,archive ouverte de langues en danger [J].I2D-Information,Données & Documents,2020(2):155-175. [7]ZHANG N,LIU Y,MA X J,et al.Identifier Resolution Tech-nology for Human-cyberphysical Ternary Based on Internet of Data [J].Journal of Software,2024,35(10):4681-4695. [8]ZHONG B,WU H,DING L,et al.Hyperledger fabric-basedconsortium blockchain for construction quality information management [J].Frontiers of Engineering Management,2020,7(4):512-527. [9]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hyperledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the thirteenth EuroSys Confe-rence.2018:1-15. [10]ANTWI M S,ADNANE A,AHMAD F,et al.The case of HyperLedger Fabric as a blockchain solution for healthcare applications [J].Blockchain:Research and Applications,2021,2(1):100012. [11]HONAR PAJOOH H,RASHID M,ALAM F,et al.Hyperledger fabric blockchain for securing the edge internet of things [J].Sensors,2021,21(2):359. [12]HAO Y,PIAO C,ZHAO Y,et al.Privacy preserving government data sharing based on hyperledger blockchain[C]//Advances in E-Business Engineering for Ubiquitous Computing:Proceedings of the 16th International Conference on E-Business Engineering(ICEBE 2019).Springer,2020:373-388. [13]RAVI D,RAMACHANDRAN S,VIGNESH R,et al.Privacypreserving transparent supply chain management through Hyperledger Fabric [J].Blockchain:Research and Applications,2022,3(2):100072. [14]CHEN Y,LIN B,CHEN X,et al.Blockchain-based TrustedService-oriented Architecture [J].Computer Science,2023,50(1):342-350. [15]ZHENG S,PAN L,HU D,et al.A blockchain-based tradingplatform for big data[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:991-996. [16]DAI W,DAI C,CHOO K K R,et al.SDTE:A secure blockchain-based data trading ecosystem [J].IEEE Transactions on Information Forensics and Security,2019,15:725-737. [17]WANG Y,SU Z,ZHANG N,et al.SPDS:A secure and auditable private data sharing scheme for smart grid based on blockchain [J].IEEE Transactions on Industrial Informatics,2020,17(11):7688-7699. [18]TRUONG N B,SUN K,LEE G M,et al.Gdpr-compliant personal data management:A blockchain-based solution [J].IEEE Transactions on Information Forensics and Security,2019,15:1746-1761. [19]TIAN Z,ZHONG R Y,VATANKHAH B A,et al.A blockchain-based evaluation approach for customer delivery satisfaction in sustainable urban logistics [J].International Journal of Production Research,2021,59(7):2229-2249. [20]CHOI W,HONG J W K.Performance evaluation of ethereum private and testnet networks using hyperledger caliper[C]//2021 22nd Asia-Pacific Network Operations and Management Symposium(APNOMS).IEEE,2021:325-329. [21]ZHAI Z,SHEN S,MAO Y.A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric [J].The Computer Journal,2024,67(4):1309-1323. |
| [1] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
| [2] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [3] | FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392. |
| [4] | ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8. |
| [5] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
| [6] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
| [7] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
| [8] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
| [9] | ZHOU Kai, CHEN Fu, LU Tianyuan, CAO Huaihu. Review of Blockchain Consensus Algorithm [J]. Computer Science, 2025, 52(11): 255-269. |
| [10] | FANG Zhipeng, LI Xiaoyu. Using Ring Blind Signature+Arbitration Authentication Mixed Coin Scheme [J]. Computer Science, 2025, 52(11): 390-397. |
| [11] | WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356. |
| [12] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
| [13] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
| [14] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
| [15] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
|
||