Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 367-368.
Special Issue: Block Chain Technology
• Information Security • Previous Articles Next Articles
LIU Yao-zong1, LIU Yun-heng2
CLC Number:
[1]刘耀宗.RFID数据流管理与挖掘若干关键技术研究[D].南京:南京理工大学,2016. [2]明华,张勇,符小辉.数据溯源技术综述[J].小型微型计算机系统,2012,33(9):1917-1923. [3]魏亚东,李康.一种基于物联网技术的大数据应用系统:CN205091639U[P].2016. [4]魏银珍,邓仲华.云环境下科学工作流的溯源数据收集和查询框架研究[J].情报理论与实践,2015,38(7):115-118. [5]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[OL].https://bitcoin.org/bitcoin.pdf,2009. [6]SWAN M.Blockchain:Blueprint for a New Economy[M].USA: O0Reilly Media Inc.,2015. [7]何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7. [8]朱岩,甘国华,邓迪,等.区块链关键技术中的安全性研究[J].信息安全研究,2016,2(12):1090-1097. [9]谢雨来.溯源的高效存储管理及在安全方面的应用研究[D].武汉:华中科技大学,2013. [10]XIE Y,FENG D,TAN Z,et al.Design and evaluation of a pro-venance-based rebuild framework[J].IEEE Transactions on Magnetics,2013,49(6):2805-2811. [11]WIDOM J.Trio:A System for Integrated Management of Data,Accuracy,and Lineage[C]∥Proceedings of the International Conference on Innovation Data Systems Research(CIDR).Asilomar,CA,January,2005:262-276. [12]IKEDA R,WIDOM J.Panda:a system for provenance and data[C]∥Proceedings for the 2nd Conference on Theory and Practice of Provenance.San Jose,CA,2010:1-4. [13]LIANG X,SHETTY S,TOSH D,et al.Provchain:A block-chain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]∥Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing.IEEE Press,2017:468-477. [14]MCCONAGHY T,MARQUES R,MÜLLER,et al.BigchainDB:A Scalable Blockchain Database (DRAFT)[OL].http://s3amazonaw5.com/arena-attachemnts/830378/db1ff2fb010d68e67dd5bfe1d20f5e33.pdf?1484096147. [15]梅海涛,刘洁.区块链的产业现状、存在问题和政策建议[J].电信科学,2016(11):134-138. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|