[1] |
ZHOU H B , XU W C , CHEN J C ,et al. Evolutionary V2X technologies toward the Internet of vehicles:challenges and opportunities[J]. Proceedings of the IEEE, 2020,108(2): 308-323.
|
[2] |
SUN Y C , WU L , WU S Z ,et al. Attacks and countermeasures in the Internet of vehicles[J]. Annals of Telecommunications, 2017,72(5): 283-295.
|
[3] |
CASEY E . The chequered past and risky future of digital forensics[J]. Australian Journal of Forensic Sciences, 2019,51(6): 649-664.
|
[4] |
VAN B E , LIU V T . Digital evidence:challenging the presumption of reliability[J]. Journal of Digital Forensic Practice, 2006,1(1): 19-26.
|
[5] |
BOYEN X , . Multipurpose identity-based signcryption[C]// Advances in Cryptology - CRYPTO 2003. Berlin:Springer, 2003: 383-399.
|
[6] |
YU H F , WANG Z C , LI J M ,et al. Identity-based proxy signcryption protocol with universal composability[J]. Security and Communication Networks, 2018: 1-11.
|
[7] |
KUMAR R , GOYAL R . On cloud security requirements,threats,vulnerabilities and countermeasures:a survey[J]. Computer Science Review, 2019,33: 1-48.
|
[8] |
HERBADJI A , GOUMIDI H , HARBI Y ,et al. Blockchain for Internet of vehicles security[C]// Blockchain for Cybersecurity and Privacy.First edition. Boca Raton:CRC Press, 2020: 159-197.
|
[9] |
蔡振华, 林嘉韵, 刘芳 . 区块链存储:技术与挑战[J]. 网络与信息安全学报, 2020,6(5): 11-20.
|
|
CAI Z H , LIN J Y , LIU F . Blockchain storage:technologies and challenges[J]. Chinese Journal of Network and Information Security, 2020,6(5): 11-20.
|
[10] |
MALONE L J . Identity-based signcryption[J]. IACR Cryptology ePrint Archive, 2002:98.
|
[11] |
BELLARE M , NAMPREMPRE C , NEVEN G . Security proofs for identity-based identification and Signature schemes[J]. Journal of Cryptology, 2009,22(1): 1-61.
|
[12] |
LIBERT B , QUISQUATER J J . A new identity based signcryption scheme from pairings[C]// Proceedings of 2003 IEEE Information Theory Workshop (Cat.No.03EX674). Piscataway:IEEE Press, 2003: 155-158.
|
[13] |
KARATI A , ISLAM S H , BISWAS G P ,et al. Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of things environments[J]. IEEE Internet of Things Journal, 2018,5(4): 2904-2914.
|
[14] |
BONEH D , GENTRY C , LYNN B ,et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Lecture Notes in Computer Science. Berlin:Springer, 2003: 416-432.
|
[15] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[C]// Lecture Notes in Computer Science. Berlin:Springer, 1998: 127-144.
|
[16] |
HUNDERA N W , MEI Q , XIONG H ,et al. A secure and efficient identity-based proxy signcryption in cloud data sharing[J]. KSII Transactions on Internet and Information Systems, 2020,14(1): 455-472.
|
[17] |
LUO W , MA W P . Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing[J]. Cluster Computing, 2019,22(2): 541-551.
|
[18] |
曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151.
|
|
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151.
|
[19] |
ZHANG P Y , ZHOU M C . Security and trust in blockchains:architecture,key technologies,and open issues[J]. IEEE Transactions on Computational Social Systems, 2020,7(3): 790-801.
|
[20] |
ZHANG Y , WU S Y , JIN B ,et al. A blockchain-based process provenance for cloud forensics[C]// Proceedings of 2017 3rd IEEE International Conference on Computer and Communications (ICCC). Piscataway:IEEE Press, 2017: 2470-2473.
|
[21] |
MALAMAS V , DASAKLIS T , KOTZANIKOLAOU P ,et al. A forensics-by-design management framework for medical devices based on blockchain[C]// Proceedings of 2019 IEEE World Congress on Services (SERVICES). Piscataway:IEEE Press, 2019: 35-40.
|
[22] |
黄晓芳, 徐蕾, 杨茜 . 一种区块链的云计算电子取证模型[J]. 北京邮电大学学报, 2017,40(6): 120-124.
|
|
HUANG X F , XU L , YANG X . Blockchain model of cloud Forensics (MT)[J]. Journal of Beijing University of Posts and Telecommunications, 2017,40(6): 120-124.
|
[23] |
OHAM C , KANHERE S S , JURDAK R ,et al. A blockchain based liability attribution framework for autonomous vehicles[EB]. 2018.
|
[24] |
李萌, 司成祥, 祝烈煌 . 基于区块链的安全车联网数字取证系统[J]. 物联网学报, 2020,4(2): 49-57.
|
|
LI M , SI C X , ZHU L H . Secure vehicular digital forensics system based on blockchain[J]. Chinese Journal on Internet of Things, 2020,4(2): 49-57.
|