Computer Science ›› 2025, Vol. 52 ›› Issue (4): 352-361.doi: 10.11896/jsjkx.240100184
• Information Security • Previous Articles Next Articles
YANG Fan, SUN Yi, LIN Wei, GAO Qi
CLC Number:
[1]LYU G,BRENNAN R W.Towards IEC 61499-Based Distributed Intelligent Automation:A Literature Review[J].IEEE Transactions on Industrial Informatics,2021,17(4):2295-2306. [2]GAO X,ZHOU M J.Development Status of Smart Home and Exploration of Open Platform [J].China Telecom,2020(7):52-57. [3]GROBAUER B,WALLOSCHEK T,STOCKER E.Understanding Cloud Computing Vulnerabilities[J].IEEE Security & Privacy Magazine,2011,9(2):50-57. [4]SCHROEDER D,SCHROEDER H.Verifiable Data Streaming[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security-CCS’12.ACM Press,2012:953. [5]WEI Y S,CAO X M,WANG S H,et al.Dual Data Integrity Verification Scheme for Cloud Storage[J].Journal of Chinese Computer Systems.2024,45(12):2944-2950. [6]PAPAMANTHOU C,SHI E,TAMASSIA R,et al.Streaming Authenticated Data Structures[J].Streaming Authenticated Data Structures,2013,7881:353-370. [7]YU C M.POSTER:Lightweight Streaming Authenticated Data Structures[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.2015:1693-1695. [8]XU J,WEI L,WU W,et al.Privacy-preserving Data IntegrityVerification by Using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System[J].Future Generation Computer Systems,2018,108:1287-1296. [9]SCHÖDER D,SIMKIN M.VeriStream-A Framework for Verifiable Data Streaming[M]//Financial Cryptography and Data Security.Berlin:Springer,2015:548-566. [10]KRUPP J,SCHRÖDER D,SIMKIN M,et al.Nearly Optimal Verifiable Data Streaming[M]//Public-Key Cryptography-PKC.Berlin:Springer,2016:417-445. [11]SUN Y,LIU Q,CHEN X,et al.An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud[J].IEEE Transactions on Information Forensics and Security,2020,15:3295-3310. [12]MIAO M,LI J,WANG Y,et al.Verifiable Data Streaming Protocol Supporting Update History Queries[J].International Journal of Intelligent Systems,2022,37(12):11342-11361. [13]WU J,WANG J,YONG X,et al.New Unbounded VerifiableData Streaming for Batch Query with Almost Optimal Overhead[M]//Computer Security-ESORICS 2022.Cham:Springer,2022,13554:346-366. [14]SUN W P,WANG S,LI J.Lightweight and Efficient Verifiable Query Scheme for Blockchain[J].Journal of Chinese Computer Systems,2024,45(8):1944-1952. [15]XU C,ZHANG C,XU J.vChain:Enabling Verifiable BooleanRange Queries over Blockchain Databases[C]//Proceedings of the 2019 International Conference on Management of Data.2019:141-158. [16]ZHANG C,XU C,XU J,et al.GEM2-Tree:A Gas-EfficientStructure for Authenticated Range Queries in Blockchain[C]//Proceedings of the 35th International Conference on Data Engineering.Macao,Macao:IEEE,2019:842-853. [17]WANG H,XU C,ZHANG C,et al.vChain+:Optimizing Verifiable Blockchain Boolean Range Queries[C]//2022 IEEE 38th International Conference on Data Engineering.Kuala Lumpur,Malaysia:IEEE,2022:1927-1940. [18]COOK D J,YOUNGBLOOD M,HEIERMAN E O,et al.MavHome:An Agent-based Smart Home[C]//Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.Fort Worth,TX,USA:IEEE Comput.Soc,2003:521-524. [19]NAGHOOSI E,IZADI I,CHEN T W.A Study on The Relation Between Alarm Deadbands and Optimal Alarm Limits[C]//Proceedings of the 2011 American Control Conference.San Francisco,CA:IEEE,2011:3627-3632. [20]LI F,HADJIELEFTHERIOU M,KOLLIOS G,et al.Authen-ticated Index Structures for Aggregation Queries[J].ACM Transactions on Information and System Security,2010,13(4):1-35. [21]OMOHUNDRO S.Cryptocurrencies,Smart Contracts,and Artificial Intelligence[J].AI Matters,2014,1(2):19-21. [22]BRASSARD G,CHAUM D,CRÉPEAU C.Minimum Disclosure Proofs of Knowledge[J].Journal of computer and system sciences,1988,37(2):156-189. [23]KRAWCZYK H,RABIN T.Chameleon Hashing and Signatures[J/OL].https://eprint.iacr.org/1998/010. [24]MERKLE R C.Protocols for Public Key Cryptosystems[C]//IEEE Symposium on Security and Privacy.1980:122-134. |
[1] | LU Mingchen, LYU Yanqi, LIU Ruicheng, JIN Peiquan. Fast Storage System for Time-series Big Data Streams Based on Waterwheel Model [J]. Computer Science, 2023, 50(1): 25-33. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | GUO Chong-ling, ZHAO Ye. Research on Application of Blockchain Technology in Field of Spatial Information Intelligent Perception [J]. Computer Science, 2020, 47(11A): 354-358. |
[4] | JIN Hui-fang, LYU Zong-wang, ZHEN Tong. Study on New Model of Food Supply Chain Finance Based on Internet of Things+Blockchain [J]. Computer Science, 2020, 47(11A): 604-608. |
[5] | WANG Xu-liang, NIE Tie-zheng, TANG Xin-ran, HUANG Ju, LI Di, YAN Ming-sen, LIU Chang. Study on Dynamic Adaptive Caching Strategy for Streaming Data Processing [J]. Computer Science, 2020, 47(11): 122-127. |
[6] | WU Ying-jie, HUANG Xin, GE Chen, SUN Lan. Adaptive Parameter Optimization for Real-time Differential Privacy Streaming Data Publication [J]. Computer Science, 2019, 46(9): 99-105. |
[7] | DING Zhi-guo, MO Yu-chang and YANG Fan. Novel Anomaly Detection Method of Online Streaming Data [J]. Computer Science, 2016, 43(10): 63-65. |
[8] | HUANG Qing-yu and LU Luo-xian. Provenance Based Information Management Method for Microblog Messages [J]. Computer Science, 2015, 42(10): 198-201. |
[9] | HU Kan LIU Yun-Sheng (Faculty of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2008, 35(1): 112-116. |
|