Computer Science ›› 2018, Vol. 45 ›› Issue (2): 48-52.doi: 10.11896/j.issn.1002-137X.2018.02.008
Previous Articles Next Articles
LIU Ming-da and SHI Yi-juan
[1] ZHANG H G,HAN W B,LAI X J,et al.Survey on cyberspace security[J].Science China(Information Sciences),2016,6(2): 125-164.(in Chinese) 张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学(信息科学),2016,46(2):125-164. [2] PEARSON S.Trusted Computing Platforms:TCPA Technology in Context[M].Prentice Hall PTR,2003:206-208. [3] 张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:23-25. [4] HAYES B.Cloud computing[J].Communications of the Acm,2008,51(7):9-11. [5] GUBBI J,BUYYA R,MARUSIC S,et al.Internet of Things(IoT):A Vision,Architectural Elements,and Future Directions[J].Future Generation Computer Systems,2013,29(7):1645-1660. [6] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494. [7] SHI W S,SUN H,CAO J,et al.Edge Computing-An Emerging Computing Model for Internet of Everything Era[J].Journal of Computer Research and Development,2017,54(5):907-924.(in Chinese) 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924. [8] XU R,GUO J,DENG L.A database security gateway to the detection of SQL attacks[C]∥International Conference on Advanced Computer Theory and Engineering.IEEE,2010:537-540. [9] MURRAY A T,MATISZIW T C,GRUBESIC T H.A Methodo-logical Overview of Network Vulnerability Analysis[J].Growth &Change,2008,39(4):573-592. [10] CHADWICK D W,BASDEN A.Evaluating Trust in a PublicKey Certification Authority[J].Computers & Security,2001,20(7):592-611. [11] BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C]∥ACM Conference on Computer and Communications Security.ACM,2004:132-145. [12] ZOHAR A.Bitcoin[J].Communications of the Acm,2015,58(9):104-113. [13] Ethereum[EB/OL].https://www.ethereum.org. [14] LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14. [15] UNDERWOOD S.Blockchain Beyond Bitcoin[J].Communications of the Acm,2016,9(11):15-17. [16] HE P,YU G,ZHANG Y F,et al.Surveyon Blockchain Techno-logy and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7. [17] DPoS[EB/OL].http://8btc.com/article-3759-1.html. [18] Bitshares[EB/OL].http://www.btsabc.org. [19] DOLEV D,YAO A.On the Security of Public Key Protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208. [20] ZHU L H,GAO F,SHEN M,et al.Survey of block chain privacy protection[J].Journal of Computer Research and Development,2017,4(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,4(10):2170-2186. [21] LIN C,PENG X H.Research on trusted network[J].Chinese Journal of Computers,2005,28(5):751-758.(in Chinese) 林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. |
No related articles found! |
|