Computer Science ›› 2018, Vol. 45 ›› Issue (2): 15-19.doi: 10.11896/j.issn.1002-137X.2018.02.003
Special Issue: Block Chain Technology
Previous Articles Next Articles
WANG Hai-long, TIAN You-liang and YIN Xin
[1] DU Z H.Research on Data Confirmation Right in Big Data Application[J].Mobile Communications,2015(13):12-16.(in Chinese) 杜振华.大数据应用中数据确权问题探究[J].移动通信,2015(13):12-16. [2] PENG Y.Research on Authenticating Data Rights in Big Data environment[J].Modern Science &Technology of Telecommunications,2016,6(5):17-20.(in Chinese) 彭云.大数据环境下数据确权问题研究[J].现代电信科技,2016,6(5):17-20. [3] TU Y H.Study on the Legal Rights of Big Data [J].Journal of Foshan University(Social Science Edition),2016,4(5):83-87.(in Chinese) 涂燕辉.大数据的法律确权研究[J].佛山科学技术学院学报(社会科学版),2016,34(5):83-87. [4] GUO B,LI Q,DUAN X L,et al.Personal Data Bank:A New Model of Personal Big Data Asset Management and Value-Ad-ded Services Based on Bank Architecture[J].Chinese Journal of Computers,2017,0(1):126-143.(in Chinese) 郭兵,李强,段旭良,等.个人数据银行——一种基于银行架构的个人大数据资产管理与增值服务的新模式[J].计算机学报,2017,0(1):126-143. [5] 王帅宇,李晨.一种基于区块链技术的大数据确权方法及系统:中国,CN106815728A[P].2017-06-09. [6] PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information Hiding-a Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078. [7] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash system.https://bitcoin.org/bitcoin.pdf. [8] BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil pairing[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Springer Berlin Heidelberg,2001:514-532. [9] WANG C,CHOW S S M,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [10] DU W,JIA J,MANGAL M,et al.Uncheatable Grid Computing[C]∥International Conference on Distributed Computing Systems,2004.IEEE,2004:4-11. [11] ZHANG F G.From Bilinear Pairings to Multilinear Maps[J].Journal of Cryptologic Research,2016,3(3):211-228.(in Chinese) 张方国.从双线性对到多线性映射[J].密码学报,2016,3(3):211-228. [12] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]∥ACM Conference on Computer and Communications Security.ACM,2007:598-609. [13] WANG B,LI B,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud[C]∥IEEE Fifth International Conference on Cloud Computing.IEEE Computer Society,2012:295-302. [14] fabric.(2017-10-20).https://github.com/hyperledger/fabric. |
No related articles found! |
|