[1] |
LI Zhaosen, LI Caihong.Research on Application of Electronic Evidence Based on BlockChain[J]. Commputer Engineer& Software, 2017, 38(8): 63-67.
|
|
李兆森,李彩虹. 基于区块链的电子数据存证应用研究[J]. 软件,2017,38(8):63-67.
|
[2] |
XIA Qi, SIFAH E B, ASAMOAH K O, et al.MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain[J]. IEEE Access, 2017(5): 14757-14767.
|
[3] |
KAREME G.On the Security and Scalability of Bitcoin’s Blockchain[C]//ACM. The 2016 ACM SIGSAC Conference on Computer and Communications Security, October 24-28, 2016, Vienna, Austria. New York: ACM, 2016: 1861-1862.
|
[4] |
WANG Shuo.Research on the Status Quo and Innovation Trend of Blockchain Technology in the Financial Field[J]. Shanghai Finance, 2016(2): 26-29.
|
|
王硕. 区块链技术在金融领域的研究现状及创新趋势分析[J]. 上海金融,2016(2):26-29.
|
[5] |
LI Dong, WEI Jinwu.Technology, Application Fields and Challenges of Blockchain Technology[J]. Telecommunications Science, 2016, 32(12): 20-25.
|
|
李董,魏进武.区块链技术原理、应用领域及挑战[J].电信科学,2016,32(12):20-25.
|
[6] |
LI Hongyu, ZHU Liehuang, SHEN Meng, et al.Blockchain-based Data Preservation System for Medical Data[J]. Journal of Med Syst, 2018, 42(8): 141.
|
[7] |
MILLER A, JUELS A, SHI E, et al.Permacoin: Repurposing Bitcoin Work for Data Preservation[C]//IEEE. 2014 IEEE Symposium on Security and Privacy, May 18-21, 2014, San Jose, CA, USA. NJ: IEEE, 2014: 475-490.
|
[8] |
ZHANG Aiqing, LIN Xiaodong.Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain[J]. Medical Systems, 2018, 42: 140.
|
[9] |
LI Peili, XU Haixia, MA Tianjun, et al.The Application of Blockchain Technology in Network Mutual Aid and User Privacy Protection[J]. Netinfo Security, 2018, 18(9): 60-65.
|
|
李佩丽,徐海霞,马添军,等.区块链技术在网络互助中的应用及用户隐私保护[J].信息网络安全,2018,18(9):60-65.
|
[10] |
YUAN Yong, WANG Feiyue.Blockchain: the State of the Art and Future Trends[J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
|
|
袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报,2016,42(4):481-494.
|
[11] |
HAN Xuan, LIU Yamin.Research on the Consensus Mechanisms of Blockchain Technology[J]. Netinfo Security, 2017, 17(9): 147-152.
|
|
韩璇,刘亚敏.区块链技术中的共识机制研究[J].信息网络安全,2017,17(9):147-152.
|
[12] |
HEARN M. Corda: A Distributed Ledger[EB/OL]. , 2018-4-10.
|
[13] |
BRESSON E, STERN J, SZYDLO M.Threshold Ring Signatures for Ad- Hoc Groups[M]// Springer. Advances in Cryptology- Asiacrypt 2002. Berlin: SpringerVerlag, 2002: 465-480.
|
[14] |
LI Wei, HE Mingxing, LUO Dawen.Identity-based Credential Scheme for Untrusted Center Threshold Ring[J]. Computer Engineering, 2008(20): 164-166, 169.
|
|
李虓,何明星,罗大文.基于身份的无可信中心门限环签名方案[J].计算机工程,2008(20):164-166,169.
|
[15] |
TANG Chunming, GAO Long.Multi-parties Key Agreement Protocol in Block Chain[J]. Netinfo Security, 2017, 17(12): 17-21.
|
|
唐春明,高隆.区块链系统下的多方密钥协商协议[J].信息网络安全,2017,17(12):17-21.
|
[16] |
LI Yundi, FENG Yong.Research Group of P2P Search and Location Technology Based on DHT[J]. Computer Application Research, 2006, 23(10): 226-228.
|
|
李运娣,冯勇.基于DHT的P2P搜索定位技术研究团[J].计算机应用研究,2006,23(10):226-228.
|
[17] |
STOICA I, MORRIS R, KARGER D, et al.Chord: A Scalable Peer-to-peer Lookup Applications[C]//ACM. Conference on Applications., San Diego, California, USA. New York: ACM, 2001: 149-160.
|
[18] |
FELD S, SCHÖNFELD M, WERNER M. Analyzing the Deployment of Bitcoin’s P2P Network under an AS-level Perspective[J]. Procedia Computer Science, 2014, 32: 1121-1126.
|