|
[1]
|
张聪丛, 郜颍颍, 赵畅, 杜洪涛. 开放政府数据共享与使用中的隐私保护问题研究——基于开放政府数据生命周期理论[J]. 电子政务, 2018(9): 24-36. http://dx.chinadoi.cn/10.16582/j.cnki.dzzw.2018.09.003
|
|
[2]
|
Blockchain, S.M. (2015) Blueprint for a New Economy. O’Reilly Media, Sebastopol.
|
|
[3]
|
杨宝华, 陈昌. 区块链原理、设计与应用[M]. 北京: 机械工业出版社, 2017: 20-33.
|
|
[4]
|
Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash Sys-tem. https://bitcoin.org/bitcoin.pdf
|
|
[5]
|
Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 2016 IEEE Symposium on Security and Privacy, San Jose, 22-26 May 2016, 839-858. [Google Scholar] [CrossRef]
|
|
[6]
|
Underwood, S. (2016) Blockchain Beyond Bitcoin. Communications of the ACM, 59, 15-17. [Google Scholar] [CrossRef]
|
|
[7]
|
Dorri, A., Kanhere, S.S., Jurdak, R. and Gauravaram, P. (2017) Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, 13-17 March 2017, 618-623. [Google Scholar] [CrossRef]
|
|
[8]
|
Huh, S., Cho, S. and Kim, S. (2017) Managing IoT De-vices Using Blockchain Platform. 2017 19th International Conference on Advanced Communication Technology, Bongpyeong, 19-22 Febrary 2017, 464-467. [Google Scholar] [CrossRef]
|
|
[9]
|
Karame, G. and Capkun, S. (2018) Blockchain Security and Privacy. IEEE Security & Privacy, 16, 11-12. [Google Scholar] [CrossRef]
|
|
[10]
|
Wang, Y., Shen, Y., Wang, H., Cao, J.L. and Jiang, X.H. (2018) Mtmr: Ensuring Mapreduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Transactions on Big Data, 4, 418-431. [Google Scholar] [CrossRef]
|
|
[11]
|
Koo, D., Shin, Y., Yun, J. and Hur, J. (2017) An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability. 2017 IEEE International Conference on Web Services, Honolulu, 25-30 June 2017, 840-843. [Google Scholar] [CrossRef]
|
|
[12]
|
Zhu, J., Li, Q., Wang, C. and Ren, K. (2018) Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems, 29, 1721-1735. [Google Scholar] [CrossRef]
|
|
[13]
|
Salman, T., Zolanvari, M., Erbad, A., Jain, R. and Samaka, M. (2019) Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21, 858-880. [Google Scholar] [CrossRef]
|
|
[14]
|
Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B. and Shi, W. (2017) Cecoin: A Decentralized PKI Mitigating MitM Attacks. Future Generation Computer Systems, 107, 805-815. [Google Scholar] [CrossRef]
|
|
[15]
|
Fenu, G., Marchesi, L., Marchesi, M. and Tonelli, R. (2018) The ICO Phenomenon and Its Relationships with Ethereum Smart Contract Environment. 2018 International Workshop on Blockchain Oriented Software Engineering, Campobasso, 20 March 2018, 26-32. [Google Scholar] [CrossRef]
|
|
[16]
|
祝跃飞, 张亚娟. 公钥密码学[M]. 北京: 高等教育出版社, 2010.
|
|
[17]
|
杨波. 现代密码学[M]. 北京: 清华大学出版社, 2007.
|