正在加载图片...
·1372 工程科学学报.第41卷第11期 [6]An R,He D B,Zhang Y R,et al.The design of an anti- Theory and Practice of Digital Libraries.Berlin,1999:443 counterfeiting system based on blockchain.J Cryptologic Res, [23]Zheng Z B,Xie S A,Dai H N,et al.An overview of blockchain 2017,4(2):199 technology:Architecture,consensus,and future trends//2017 /EEE [Tian H B,He JJ,Fu L Q,et al.A privacy preserving fair contract International Congress on Big Data (BigData Congress). signing protocol based on block chains.J Cryptologic Res,2017, Honolulu,2017:557 4(2):187 [24]Baliga A.Understanding blockchain consensus models[J/OL]. [8]Mettler M.Blockchain technology in healthcare:The revolution PersistenrSystems(2017-04)[2019-03-01].https://pdfs.semanticsch starts herelf2016 IEEE 18th International Conference on e-Health olar.org/da8a/37b10bc1521a4d3de925d7ebc44bb606d740.pdf?ga= Networking,Applications and Services (Healthcom).Munich, 2.21200635.1919538867.1522092864-1798624458.1520283070& 2016:1 source=post_page [9]Wang Y D,Li L,Hu D.A literature review of block chain.J China [25]Bach L M,Mihaljevic B,Zagar M.Comparative analysis of Uniy Min Technol Social Sci.2018(3):74 blockchain consensus algorithms//2018 41st International (王元地,李粒,胡谍区块链研究综述.中国矿业大学学报:社会 Convention on Information and Communication Technology, 科学版,2018(3):74) Electronics and Microelectronics (MIPRO).Opatija,2018:1545 [10]Lin I C,Liao T C.A survey of blockchain security issues and [26]Jakobsson M,Juels A.Proofs of work and bread pudding challenges.Int J Nenwork Security,2017,19(5):653 protocols//Secure Information Nenvorks.Boston:Springer,1999: [11]Zheng Z B,Xie S A,Dai H N,et al.Blockchain challenges and 258 opportunities:a survey.Int Web Grid Services,2018,14(4):352 [27]Kiayias A,Russell A,David B,et al.Ouroboros:A provably [12]Randall D,Goel P,Abujamra R.Blockchain applications and use secure proof-of-stake blockchain protocol/lAnnual International cases in health information technology.J Health Med Informat, Cryptology Conference.Santa Barbara:Springer,2017:357 2017,8(276):2 [28]Castro M,Liskov B.Practical byzantine fault tolerance// [13]Yuan Y,Wang F Y.Blockchain:The state of the art and future Proceedings of the 3rd Symposium on Operating Systems Design trends.Acta Autom Sinica,2016,42(4):481 and Implementation.New Orleans,1999:173 (袁勇,王飞跃.区块链技术发展现状与展望.自动化学报,2016, [29]Gilad Y,Hemo R,Micali S,et al.Algorand:Scaling byzantine 42(4):481) agreements for cryptocurrencies//Proceedings of the 26th [14]Goldwasser S,Micali S.Probabilistic encryption.J Compur Sysr Symposium on Operating Systems Principles.Shanghai,2017:51 Sci,1984,28(2):270 [30]Ongaro D,Ousterhout J.In search of an understandable consensus [15]Evans D S.Economic aspects of bitcoin and other decentralized algorithm//2014 Anual Technical Conference (USENIXATC public-ledger currency platforms[J/OL].SSRN (2014-04-15) 14).San Diego,2014:305 [2019-03-01].https://papers.ssrn.com/sol3/papers.cfim?abstract [31]Lowe G.Casper:a compiler for the analysis of security protocols id=2424516 JComput Security,1998,6(1-2):53 [16]Garay J,Kiayias A,Leonardos N.The bitcoin backbone protocol: [32]Copeland C,Zhong H X.Tangaroa:a byzantine fault Analysis and applications/lAnual International Conference on the tolerantraft[J/OL].Stanford University Press (2018-04-10)[2019- Theory and Applications of Cryptographic Techniques.Berlin 03-01].http://www.scs.stanford.edu/14au-cs244b/labs/projects/ 2015:281 copeland zhong pdf [17]Barbosa M,Farshim P.On the semantic security of functional [33]Gervais A,Karame G O,Wust K,et al.On the security and encryption schemes//International Workshop on Public Key performance of proof of work blockchains//Proceedings of the Cryptography.Berlin,2013:143 2016 ACM SIGSAC Conference on Computer and [18]Lamport L.The part-time parliament.ACM Trans Comput Syst, Communications Security.Vienna,2016:3 1998,16(2):133 [34]King S,Nadal S.PPCoin:peer-to-peer crypto-currency with proof- [19]Szydlo M.Merkle tree traversal in log space and of-stake[J/OL].Bitcoin(2012-08-19)[2019-03-011.https://bitcoin. timelllnternational Conference on the Theory and Applications of peryaudo.org/vendor/peercoin-paper.pdf Cryptographic Techniques.Berlin,2004:541 [35]Cachin C.Architecture of the hyperledger blockchain fabric/ [20]Jakobsson M,Leighton T,Micali S,et al.Fractal Merkle tree Workshop on Distributed Cryptocurrencies and Consensus representation and traversal//Cryptographers'Track at the RSA Ledgers.Switzerland,2016 Conference.Berlin,2003:314 [36]Du M X,Ma X F,Zhang Z,et al.A review on consensus algorithm [21]Shen X,Pei QQ,Liu X F.Survey of block chain.Chin J Nenvork of blockchain/017 IEEE International Conference on Systems, Inf Securi0y,2016,2(11):00107-1 Man,and Cybernetics (SMC).Banff,2017:2567 (沈鑫,裴庆祺,刘雪峰.区块链技术综述,网络与信息安全学报, [37]Micali S,Rabin M.Vadhan S.Verifiable random functions//40th 2016,2(11):00107-1) Anmual Symposium on Foundations of Computer Science (Cat.No. [22]Adamic L A.The small world webl/International Conference on 99CB37039).New York,1999:120An  R,  He  D  B,  Zhang  Y  R,  et  al.  The  design  of  an  anti￾counterfeiting  system  based  on  blockchain. J Cryptologic Res, 2017, 4(2): 199 [6] Tian H B, He J J, Fu L Q, et al. A privacy preserving fair contract signing protocol based on block chains. J Cryptologic Res, 2017, 4(2): 187 [7] Mettler  M.  Blockchain  technology  in  healthcare:  The  revolution starts here//2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).  Munich, 2016: 1 [8] Wang Y D, Li L, Hu D. A literature review of block chain. J China Univ Min Technol Social Sci, 2018(3): 74 (王元地, 李粒, 胡谍. 区块链研究综述. 中国矿业大学学报:社会 科学版, 2018(3):74 ) [9] Lin  I  C,  Liao  T  C.  A  survey  of  blockchain  security  issues  and challenges. Int J Network Security, 2017, 19(5): 653 [10] Zheng Z B, Xie S A, Dai H N, et al. Blockchain challenges and opportunities: a survey. Int J Web Grid Services, 2018, 14(4): 352 [11] Randall D, Goel P, Abujamra R. Blockchain applications and use cases  in  health  information  technology. J Health Med Informat, 2017, 8(276): 2 [12] Yuan  Y,  Wang  F  Y.  Blockchain:  The  state  of  the  art  and  future trends. Acta Autom Sinica, 2016, 42(4): 481 (袁勇, 王飞跃. 区块链技术发展现状与展望. 自动化学报, 2016, 42(4):481 ) [13] Goldwasser  S,  Micali  S.  Probabilistic  encryption. J Comput Syst Sci, 1984, 28(2): 270 [14] Evans  D  S.  Economic  aspects  of  bitcoin  and  other  decentralized public-ledger  currency  platforms[J/OL]. SSRN (2014−04−15) [2019−03−01]. https://papers.ssrn.com/sol3/papers.cfm?abstract_ id=2424516 [15] Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol: Analysis and applications//Annual International Conference on the Theory and Applications of Cryptographic Techniques.  Berlin, 2015: 281 [16] Barbosa  M,  Farshim  P.  On  the  semantic  security  of  functional encryption  schemes//International Workshop on Public Key Cryptography. Berlin, 2013: 143 [17] Lamport  L.  The  part-time  parliament. ACM Trans Comput Syst, 1998, 16(2): 133 [18] Szydlo  M.  Merkle  tree  traversal  in  log  space  and time//International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, 2004: 541 [19] Jakobsson  M,  Leighton  T,  Micali  S,  et  al.  Fractal  Merkle  tree representation  and  traversal//Cryptographers’ Track at the RSA Conference. Berlin, 2003: 314 [20] Shen X, Pei Q Q, Liu X F. Survey of block chain. Chin J Network Inf Security, 2016, 2(11): 00107-1 (沈鑫, 裴庆祺, 刘雪峰. 区块链技术综述. 网络与信息安全学报, 2016, 2(11):00107-1 ) [21] [22] Adamic  L  A.  The  small  world  web//International Conference on Theory and Practice of Digital Libraries. Berlin, 1999: 443 Zheng Z B, Xie S A, Dai H N, et al. An overview of blockchain technology: Architecture, consensus, and future trends//2017 IEEE International Congress on Big Data (BigData Congress). Honolulu, 2017: 557 [23] Baliga  A.  Understanding  blockchain  consensus  models[J/OL]. Persistent Systems(2017−04)[2019−03−01].https://pdfs.semanticsch olar.org/da8a/37b10bc1521a4d3de925d7ebc44bb606d740.pdf?_ga= 2.21200635.1919538867.1522092864-1798624458.1520283070& source=post_page [24] Bach  L  M,  Mihaljevic  B,  Zagar  M.  Comparative  analysis  of blockchain  consensus  algorithms//2018  41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, 2018: 1545 [25] Jakobsson  M,  Juels  A.  Proofs  of  work  and  bread  pudding protocols//Secure Information Networks.  Boston:  Springer,  1999: 258 [26] Kiayias  A,  Russell  A,  David  B,  et  al.  Ouroboros:  A  provably secure  proof-of-stake  blockchain  protocol//Annual International Cryptology Conference. Santa Barbara: Springer, 2017: 357 [27] Castro  M,  Liskov  B.  Practical  byzantine  fault  tolerance// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. New Orleans, 1999: 173 [28] Gilad  Y,  Hemo  R,  Micali  S,  et  al.  Algorand:  Scaling  byzantine agreements  for  cryptocurrencies//Proceedings of the 26th Symposium on Operating Systems Principles. Shanghai, 2017: 51 [29] Ongaro D, Ousterhout J. In search of an understandable consensus algorithm//2014 Annual Technical Conference ({USENIX}{ATC} 14).San Diego, 2014: 305 [30] Lowe G. Casper: a compiler for the analysis of security protocols. J Comput Security, 1998, 6(1-2): 53 [31] Copeland  C,  Zhong  H  X.  Tangaroa:  a  byzantine  fault tolerantraft[J/OL]. Stanford University Press (2018−04−10)[2019− 03−01]. http://www.scs.stanford.edu/14au-cs244b/labs/projects/ copeland_zhong.pdf [32] Gervais  A,  Karame  G  O,  Wüst  K,  et  al.  On  the  security  and performance  of  proof  of  work  blockchains//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna, 2016: 3 [33] King S, Nadal S. PPCoin: peer-to-peer crypto-currency with proof￾of-stake[J/OL].Bitcoin(2012−08−19)[2019−03−01].https://bitcoin. peryaudo.org/vendor/peercoin-paper.pdf [34] Cachin  C.  Architecture  of  the  hyperledger  blockchain  fabric// Workshop on Distributed Cryptocurrencies and Consensus Ledgers. Switzerland, 2016 [35] Du M X, Ma X F, Zhang Z, et al. A review on consensus algorithm of  blockchain//2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Banff, 2017: 2567 [36] Micali S, Rabin M, Vadhan S. Verifiable random functions//40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039). New York, 1999: 120 [37] · 1372 · 工程科学学报,第 41 卷,第 11 期
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有