[1] |
HONG S , OH M , LEE S . Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA[J]. Mathematical & Computer Modelling, 2013,58(1-2): 254-260.
|
[2] |
徐书欣, 赵景 . ARP欺骗攻击与防御策略探究[J]. 现代电子技术, 2018,41(8): 78-82.
|
|
XU S X , ZHAO J . Investigation of ARP spoofing attack and defense strategies[J]. Modern Electronics Technique, 2018,41(8): 78-82.
|
[3] |
林宏刚, 陈麟, 王标 ,等. 一种主动检测和防范ARP攻击的算法研究[J]. 四川大学学报(工程科学版), 2008,40(3): 143-149.
|
|
LIN H G , CHEN L , WANG B ,et al. Research on an algorithm of active detecting and resisting ARP attack[J]. Journal of Sichuan University(Engineering Science Edition), 2008,40(3): 143-149.
|
[4] |
秦丰林, 段海新, 郭汝廷 . ARP 欺骗的监测与防范技术综述[J]. 计算机应用研究, 2009,26(1): 30-33.
|
|
QIN F L , DUAN H X , GUO R Y . Overview of ARP spoofing detection and prevention techniques[J]. Application Research of Computers, 2009,26(1): 30-33.
|
[5] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008.
|
[6] |
刘江, 霍如, 李诚成 ,等. 基于命名数据网络的区块链信息传输机制[J]. 通信学报, 2018(1): 24-33.
|
|
LIU J , HUO R , LI C C ,et al. Information transmission mechanism of Blockchain technology based on named-data networking[J]. Journal on Communications, 2018(1): 24-33.
|
[7] |
SWAN M . Blockchain thinking :the brain as a decentralized autonomous corporation[commentary][J]. IEEE Technology & Society Magazine, 2015,34(4): 41-52.
|
[8] |
张宁, 王毅, 康重庆 ,等. 能源互联网中的区块链技术:研究框架与典型应用初探[J]. 中国电机工程学报, 2016,36(15): 4011-4022.
|
|
ZHANG N , WANG Y , KANG C Q ,et al. Blockchain technique in the energy Internet:preliminary research framework and typical applications[J]. Proceedings of the CSEE, 2016,36(15): 4011-4022.
|
[9] |
钱卫宁, 邵奇峰, 朱燕超 ,等. 区块链与可信数据管理:问题与方法[J]. 软件学报, 2018(1): 150-159.
|
|
QIAN W N , SHAO Q F , ZHU Y C ,et al. Research problems and methods in Blockchain and trusted data management[J]. Journal of Software, 2018(1): 150-159.
|
[10] |
朱建明, 付永贵 . 基于区块链的供应链动态多中心协同认证模型[J]. 网络与信息安全学报, 2016,2(1): 27-33.
|
|
ZHU J M , FU Y G . Supply chain dynamic multi-center coordination authentication model based on block chain[J]. Chinese Journal of Network and Information Security, 2016,2(1): 27-33.
|
[11] |
袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494.
|
|
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016,42(4): 481-494.
|
[12] |
闵新平, 李庆忠, 孔兰菊 ,等. 许可链多中心动态共识机制[J]. 计算机学报 2018,41(5): 1005-1020.
|
|
MIN X P , LI Q Z , KONG L J ,et al. Permissioned Blockchain dynamic consensus mechanism based multi-centers[J]. Chinese Journal of Computers, 2018,41(5): 1005-1020.
|
[13] |
刘明达, 拾以娟 . 基于区块链的远程证明模型[J]. 计算机科学, 2018,45(2).
|
|
LIU M D , SHI Y J . Remote attestation model based on Blockchain[J]. Computer Science, 2018,45(2): 48-52.
|
[14] |
刘敖迪, 杜学绘, 王娜 ,等. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报, 2018.
|
|
LIU A D , DU X H , WANG N ,et al. Research progress of blockchain technology and its application in information security[J]. Journal of Software, 2018,29(7): 2092-2115.
|
[15] |
ZYSKIND G , NATHAN O , PENTLAND A . Decentralizing privacy:uing blockchain to protect personal data[C]// 2015 IEEE Symposium on Security and Privacy Workshops (SPW 2015). 2015: 180-184.
|
[16] |
BRAMBILLA G , AMORETTI M , ZANICHELLI F . Using block chain for peer-to-peer proof-of-location[J]. arXiv:1607.00174, 2016.
|
[17] |
李大伟, 刘建伟, 关振宇 ,等. 基于区块链的密钥更新和可信定位系统[J]. 密码学报, 2018(1).
|
|
LI D W , LIU J W , GUANG Z Y ,et al. Key update and trusted positioning system based on blockchain[J]. Journal of Cryptologic Research, 2018,5(1): 35-42.
|
[18] |
于佳, 程相国, 李发根 ,等. 标准模型下可证明安全的入侵容忍公钥加密方案[J]. 软件学报, 2013(2): 266-278.
|
|
YU J , CHEN X G , LI F G ,et al. Provably secure intrusion-resilient public-key encryption scheme in the standard model[J]. Journal of Software, 2013(2): 266-278.
|
[19] |
陈泯融, 张席, 何凯 ,等. 改进的选择密文安全公钥加密方案[J]. 计算机学报, 2013,36(6): 1149-1154.
|
|
CHEN M R , ZHANG X , HE K ,et al. Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks[J]. Chinese Journal of Computers, 2013,36(6): 1149-1154.
|
[20] |
李经纬, 贾春福, 刘哲理 ,等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128.
|
|
LI J W , JIA C F , LIU Z L ,et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128
|