Computer Science ›› 2021, Vol. 48 ›› Issue (11): 36-45.doi: 10.11896/jsjkx.201000002
• Blockchain Technology • Previous Articles Next Articles
LIAN Wen-juan1, ZHAO Duo-duo1, FAN Xiu-bin1,2, GENG Yu-nian2, FAN Xin-tong3
CLC Number:
[1]PLOUTON V.Grammatikos,Panayotis G.Cottis.IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond[S].ITU-R Recommendation M.2083-0,2015. [2]View on 5G architecture Version 3.0[M/OL].The 5G Infra-structure Public Private Partnership Architecture Working Group,2019:18-19.https://5g-ppp.eu/wp-content/uploads/2019/07/5G-PPP-5G-Architecture-White-Paper_v3.0_PublicConsultation.pdf. [3]ZHANG S,WANG Y,ZHOU W.Towards Secure 5G Net-works:A Survey[J].Computer Networks,2019,162:106871. [4]SCHNEIDER P,HORN G.Towards 5G Security[C]//Trustcom/bigdatase/ispa.IEEE,2015:1165-1170. [5]SORENSEN L T,KHAJURIA S,SKOUBY K E.5G Visions ofUser Privacy[J].IEEE Vehicular Technology Conference,2015,81(5):1-4. [6]KUTSCHER D.It's the network:Towards better security andtransport performance in 5G[C]//2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).San Francisco,CA,2016:656-661. [7]FAN X B,LIU X,WANG X L,et al.Identification-basedauthentication system CFL-netspace authentication and its examples[M].Beijing:Beijing University of Posts and Teleco-munications Press,2019:33-69. [8]FAN W Z,FAN Y N,HE Z Z,et al.CFL_BLP model[J].Journal of Taishan University,2018,40(6):60-66. [9]DU C L,LIU J M,FAN X B,et al.CFL is Statistical Zero-Knowledge Proof System[J].Journal of Information Security Research,2016,2(7):621-627. [10]QIN H B,PAN Y J,FAN X B,et al.Analysis on CFL Provable Security[J].Journal of Information Security Research,2016,2(7):589-599. [11]FAN X B.New generation of identity authentication technology CFL[J].Journal of Information Security Research,2016,2(7):587-588. [12]LI C C,JI S W,FAN X B,et al.The Overview of Authentication Systems[J].Journal of Information Security Research,2016,2(7):649-659. [13]DU C L,FAN X B.CFL Authentication System and Its Applications in the Blockchain[J].Journal of Information Security Research,2017,3(3):220-226. [14]BELL D E,LAPADULA L J.Secure Computer Systems:AMathematical Model[J].The MITRE Corporation,1973,2:239-263. [15]NOFER M,GOMBER P,HINZ O,et al.Blockchain[J].Busi-ness & Information Systems Engineering,2017,59(3):183-187. [16]ZHENG Z B,XIE S A.Blockchain challenges and opportunities:a survey[J].International Journal of Web and Grid Services,2018,14(4):352-375. [17]WANG Y,SHEN Y,WANG H,et al.MtMR:Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications[J].IEEE Transactions on Big Data,2016,4(3):418-431. [18]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494. [19]LI Q,TAN Y,YU X,et al.Resear on Blockchain Authentication Based on CFL[C]//Proceedings of the 6th China command and Control Conference (Volume 2).2018:587-589. [20]SHU Z X,LI T F,YU X,et al.Research on cfl-based blockchain system authentication Mechan-ism[J].Application Research of Computers,2020,38(2):1-10. [21]LI Q,SHU Z X,YU X,et al.Authentication Mechanism inBlockchain Systems[J].Journal of Command and Control,2019(1):1-17. [22]YAN S J,MIN L Q,FAN X B.Researchon the knowledge security[J].Journal on Communications,2014,35(Z2):204-211. [23]YAN S J,FAN X B,CHEN Y G,et al.Construction of Narrow Security Knowledge Base[J].Information Security and Communications Privac,2015(6):99-103. [24]Ten academicians unveil BCS 2019 Qian xin first proposes the concept of “SECURITY:BUILT-IN DNA”[J].China Information Security,2019(9):102. [25]FERNANDES D A B,FREIRE M M,FAZENDEIRO P A P,et al.Applications of artificial immune systems to computer security:A survey[J].Journal of Information Security & Applications,2017,35:138-159. [26]ZHANG B.Research on key Technologies of Interactive and Attack Proactive Defense in Edge-computing Network [D].Nanjing:Guniversity of Science & Technology,2019. [27]LUO Y B.Research on Proactive Defense of Computer Network[D].Hunan:National University of Defense Technology,2017. [28]IFTEKHAR A,TAHMIN N,SHAHINA S U,et al.Protection of Sensitive Data in Zero Trust Model[C]//Proceedings of the International Conference on Computing Advancements (ICCA 2020).Association for Computing Machinery,New York,NY,USA,2020,63:1-5. [29]ZHANG H G,JIA C F,LIN J Q.Foreword of trusted computing for autonomous security and controllability[J].Journal of Software,2019,30(8):2227-2228. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[3] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[4] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[5] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|