[1] |
XIAO L , LI Y , HAN G , et al. A secure mobile crowdsensing game with deep reinforcement learning[J]. IEEE Transactions on Information Forensics & Security, 2017,136(1):35-47.
|
[2] |
肖亮, 李强达, 刘金亮 . 云存储安全技术研究进展综述[J]. 数据采集与处理, 201631(3):464-472.
|
|
XIAO L , LI Q D , LIU J L , . Survey on secure cloud storage[J]. Journal of Data Acquisition & Processing, 201631(3):464-472.
|
[3] |
XIAO L , XU D , XIE C , et al. Cloud storage defense against advanced persistent threats:a prospect theoretic study[J]. IEEE Journal on Selected Areas in Communications, 2011,35(3):534-544.
|
[4] |
刘明辉, 张尼, 张云勇 , 等. 云环境下的敏感数据保护技术研究[J]. 电信科学, 201430(11):2-8.
|
|
LIU M H , ZHANG N , ZHANG Y Y , , et al. Research on sensitive data protection technology on cloud computing[J]. Telecommunications Science, 201430(11):2-8.
|
[5] |
袁勇, 王飞跃 . 云环境下的敏感数据保护技术研究[J]. 自动化学报, 201642(4):481-494.
|
|
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 201642(4):481-494.
|
[6] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008.
|
[7] |
BUTERIN V A . Next-generation smart contract and decentralized application platform[R]. 2014.
|
[8] |
邵奇峰, 金澈清, 张召 , 等. 区块链技术:架构及进展[J]. 计算机学报, 2017:1-20.
|
|
SHAO Q F , JIN C Q , ZHANG Z , , et al. Blockchain technology:architecture and progress[J]. Chinese Journal of Computers, 2017:1-20.
|
[9] |
ZYSKIND G , NATHAN O . Decentralizing privacy:Using blockchain to protect personal data[C]// IEEE Security and Privacy Workshops, May 21-22, 2015, San Jose,CA,USA.Piscataway: IEEE Press, 2015:180-184.
|
[10] |
WOOD G . Ethereum:a secure decentralised generalized transaction ledger[EB]. 2014.
|
[11] |
AZARIA A , EKBLAW A , VIEIRA T , et al. MedRec:using blockchain for medical data access and permission management[C]// IEEE International Conference on Open and Big Data, Dec 5-8, 2016, Washington,DC,USA.Piscataway: IEEE Press, 2016:25-30.
|
[12] |
BULDAS A , LAANOJA R , TRUU A , et al. Keyless signature infrastructure and PKI:hash-tree signatures in pre-and post-quantum world[J]. International Journal of Services Technology & Management, 2017,23(1/2):117.
|
[13] |
BULDAS A , LAANOJA R , TRUU A , et al. Efficient quantum-immune keyless signatures with identity[J]. IACR Cryptology ePrint Archive, 2014:321.
|
[14] |
DORRI A , STEGER M , KANHERE S , et al. Blockchain:a distributed solution to automotive security and privacy[J]. IEEE Communications Magazine, 2017,55(12):119-125.
|
[15] |
DORRI A , KANHERE S , JURDAK R , et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// IEEE International Conference on Pervasive Computing and Communications, March 13-17, 2017, Kona,HI,USA.Piscataway: IEEE Press, 2017:618-623.
|
[16] |
BAHGA A , MADISETTI V K . Blockchain platform for industrial Internet of things[J]. Journal of Software Engineering and Applications, 2016,9(10):533.
|
[17] |
ALI A , NELSON J , SHEA R , et al. Blockstack:a global naming and storage system secured by blockchains[C]// USENIX Annual Technical Conference, July 12-14, 2016, Santa Clara,CA,USA.Piscataway: IEEE Press, 2016:181-194.
|
[18] |
AITZHAN N , SVETINOVIC D . Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[J]. IEEE Transactions on Dependable & Secure Computing, 2016(99):1.
|
[19] |
赵明慧, 张琭, 亓晋 . 基于区块链的社会物联网可信服务管理框架[J]. 电信科学, 2017,33(10):19-25.
|
|
ZHAO M H , ZHANG L , QI J . A framework of trusted services management based on block chain in social internet of things[J]. Telecommunications Science, 2017,33(10):19-25.
|
[20] |
WANG B , ZHENG Y , LOU W , et al. DDoS attack protection in the era of cloud computing and software-defined networking[J]. Computer Networks, 2015(81):308-319.
|
[21] |
李传煌, 孙正君, 袁小雍 , 等. 基于深度学习的实时DDoS攻击检测[J]. 电信科学, 2017,33(7):53-65.
|
|
LI C H , SUN Z J , YUAN X Y , et al. Real-time DDoS attack detection based on deep learning[J]. Telecommunications Science, 2017,33(7):53-65.
|
[22] |
王帅, 汪来富, 金华敏 , 等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7):145-150.
|
|
WANG S , WANG L F , JIN H M , et al. Big data application in network security analysis[J]. Telecommunications Science, 2015,31(7):145-150.
|
[23] |
KOSBA A , MILLER A , SHI E , et al. Hawk:the blockchain model of cryptography and privacy-preserving smart contracts[C]// IEEE Symposium on Security and Privacy (SP), May 23-25, 2016, San Jose,CA,USA.Piscataway: IEEE Press, 2016:839-858.
|
[24] |
SIVARAMAN V , CHAN D , EARL D , et al. Smart-phones attacking smart-homes[C]// ACM Conference on Security &Privacy in Wireless and Mobile Networks, July 18-20, 2016, Darmstadt,Germany.New York: ACM Press, 2016:195-200.
|
[25] |
HU Q , LV S , SHI Z , et al. Defense Against advanced persistent threats with expert system for internet of things// IEEE/IFIP International Conference on Wireless Algorithms Systems and Application, June 19-21, 2017, Guilin,China.Piscataway: IEEE Press, 2017.
|
[26] |
NARAYANAN A , BONNEAU J , FELTEN E , et al. Bitcoin and cryptocurrency technologies:a comprehensive introduction[M]. Princeton: Princeton University Press, 2016.
|
[27] |
RODRIGUES B , BOCEK T , LAREIDA A , et al. A blockchain-based architecture for collaborative DDoS mitigation with smart contracts[C]// IFIP International Conference on Autonomous Infrastructure,Management and Security, July 10-13, 2017, University of Zurich,Zurich,Switzerland.Berlin: Springer-Verlag, 2017:16-29.
|
[28] |
HU W , AO M , SHI L , et al. Review of blockchain-based DNS alternatives[J]. 网络与信息安全学报, 2017,3(3):71-77.
|
|
HU W , AO M , SHI L , et al. Review of blockchain-based DNS alternatives[J]. Chinese Journal of Network and Information Security, 2017,3(3):71-77.
|