|
[1]
|
程瑶, 高丽芬, 胡全贵. 区块链共识机制之POW算法[J]. 数字通信世界, 2019(3): 81.
|
|
[2]
|
Dwork, C. and Naor, M. (1993) Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F., Eds, Advances in Cryptology—CRYPTO’ 92. CRYPTO 1992. Lecture Notes in Computer Science, Vol. 740, Springer, Berlin, Heidelberg, 139-147. [Google Scholar] [CrossRef]
|
|
[3]
|
Li, J., Chen, Y.S. and Song, H.T. (2021) Research on Digital Cur-rency Supervision Model Based on Blockchain Technology. Journal of Physics: Conference Series, 1744, Article ID: 032112. [Google Scholar] [CrossRef]
|
|
[4]
|
Han, S.J., Lee, S., Lee, D. and Park, S. (2020) BACS: An Experimental Study for Access Control System in Public Blockchain. The Journal of the Institute of Internet, Broadcast-ing and Communication, 20, 3-8.
|
|
[5]
|
周超. 结合属性与角色的访问控制关键技术研究[D]: [硕士学位论文]. 郑州: 战略支援部队信息工程大学, 2018.
|
|
[6]
|
张永建. RSA算法和SM2算法的研究[D]: [硕士学位论文]. 赣州: 江西理工大学, 2015.
|
|
[7]
|
Somsuk, K. (2020) The New Integer Factorization Algorithm Based on Fermat’s Factoriza-tion Algorithm and Euler’s Theorem. International Journal of Electrical and Computer Engineering (IJECE), 10, 1469-1476. [Google Scholar] [CrossRef]
|
|
[8]
|
孙克泉. RSA密码分析中分解大整数的判定算法[J]. 计算机工程, 2010, 36(15): 142-144.
|
|
[9]
|
宋衍, 韩臻, 刘凤梅, 刘磊. 基于访问树的策略隐藏属性加密方案[J]. 通信学报, 2015, 36(9): 119-126.
|
|
[10]
|
Hoobi, M.M., Sulaiman, S.S. and AbdulMunem, I.A. (2020) Enhanced Multistage RSA Encryption Model. IOP Conference Series: Materials Science and Engineering, Thi-Qar, 15-16 July 2020, Vol. 928. [Google Scholar] [CrossRef]
|
|
[11]
|
Rastenis, J., Ramanauskaitė, S., Janulevičius, J., Čenys, A., Slotkienė, A. and Pakrijauskas, K. (2020) E-Mail-Based Phishing Attack Taxonomy. Applied Sciences, 10, 2363. [Google Scholar] [CrossRef]
|
|
[12]
|
袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
|