[1] |
周致成, 李立新, 李作辉 . 基于区块链技术的高效跨域认证方案[J]. 计算机应用, 2018,38(2): 316-320.
|
|
ZHOU Z C , LI L X , LI Z H . Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018,38(2): 316-320.
|
[2] |
杨小东, 安发英, 杨平 ,等. 云环境下基于代理重签名的跨域身份认证方案[J]. 计算机学报, 2019,42(4): 756-771.
|
|
YANG X D , AN F Y , YANG P ,et al. Cross-domain authentication scheme based on proxy resignature in cloud environment[J]. Chinese Journal of Computers, 2019,42(4): 756-771.
|
[3] |
曹守启, 孙青, 曹莉凌 . 动态 ID 多因素远程用户身份认证方案的改进[J]. 计算机工程与科学, 2019,41(4): 633-640.
|
|
CAO S Q , SUN Q , CAO L L . An improved identity authentication scheme of dynamic ID multifactor remote users[J]. Computer Engineering & Science, 2019,41(4): 633-640.
|
[4] |
LEE J H . BIDaaS:blockchain based ID as a service[J]. IEEE Access, 2018,6: 2274-2278.
|
[5] |
LIN C , HE D , HUANG X ,et al. A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems[J]. IEEE Access, 2018,6: 28203-28212.
|
[6] |
FERDOUS M S , CHOWDHURY F , ALASSAFI M O . In search of self-sovereign identity leveraging blockchain technology[J]. IEEE Access, 2019,7: 103059-103079.
|
[7] |
DUNPHY P , PETITCOLAS F A P . A first look at identity management schemes on the blockchain[J]. IEEE Security & Privacy, 2018,16(4): 20-29.
|
[8] |
章峰, 史博轩, 蒋文保 . 区块链关键技术及应用研究综述[J]. 网络与信息安全学报, 2018,4(4): 22-29.
|
|
ZHANG F , SHI B X , JIANG W B . Review of key technology and its application of blockchain[J]. Chinese Journal of Network and Information Security, 2018,4(4): 22-29.
|
[9] |
董贵山, 陈宇翔, 张兆雷 ,等. 基于区块链的身份管理认证研究[J]. 计算机科学, 2018,45(11): 52-59.
|
|
DONG G S , CHEN Y X , ZHANG Z L ,et al. Research on identity management authentication based on blockchain[J]. Computer Science, 2018,45(11): 52-59.
|
[10] |
杨明慧, 邹翔 . 美国电子身份指南评析[J]. 计算机工程与应用, 2019,55(23): 22-28,34.
|
|
YANG M H , ZOU X . Evaluation of US electronic identity guide[J]. Computer Engineering and Applications, 2019,55(23): 22-28,34.
|
[11] |
胡传平, 陈兵, 方滨兴 ,等. 全球主要国家和地区网络电子身份管理发展与应用[J]. 中国工程科学, 2016,18(6): 99-103.
|
|
HU C P , CHEN B , FANG B X ,et al. Development and application of network electronic identity management in major countries and regions around the world[J]. Strategic Study of CAE, 2016,18(6): 99-103.
|
[12] |
张富友, 王琼霄, 宋利 . 基于生物特征识别的统一身份认证系统研究[J]. 信息网络安全, 2019(9): 86-90.
|
|
ZHANG F Y , WANG Q X , SONG L . Research on unified identity authentication system based on biometrics[J]. Netinfo Security, 2019(9): 86-90.
|
[13] |
ANDOLA N , RAGHAV , GOGOI M ,et al. Vulnerabilities on Hyperledger Fabric[J]. Pervasive and Mobile Computing, 2019,(59):101050.
|
[14] |
闫泓任, 马国帅, 钱宇华 . 基于节点度中心性的无监督特征选择[J]. 数据采集与处理, 2019,34(2): 312-321.
|
|
YAN H R , MA G S , QIAN Y H . Degree centrality based feature selection[J]. Journal of Data Acquisition and Processing, 2019,34(2): 312-321.
|
[15] |
刘彩虹, 刘强, 祁瑞华 . 一种邻近 H-index 的社会网络关键节点识别技术[J]. 中国科技论文, 2019,14(3): 296-302.
|
|
LIU C H , LIU Q , QI R H . Vital node identification technology of social networks using neighbors' H-index values[J]. China Science Paper, 2019,14(3): 296-302.
|
[16] |
马福民, 逯瑞强, 张腾飞 . 基于局部密度自适应度量的粗糙K-means聚类算法[J]. 计算机工程与科学, 2018,40(1): 184-190.
|
|
MA F M , LU R Q , ZHANG T F . Rough K-means clustering based on local density adaptive measure[J]. Computer Engineering &Science, 2018,40(1): 184-190.
|
[17] |
BHATTACHARJYA A , ZHONG X , LI X . A lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with fourlayered authentication stack[J]. IEEE Access, 20197: 30487-30506.
|
[18] |
戴千一, 徐开勇, 郭松 ,等. 分布式网络环境下基于区块链的密钥管理方案[J]. 网络与信息安全学报, 2018,4(9): 23-35.
|
|
DAI Q Y , XU K Y , GUO S ,et al. Blockchain-based key management scheme for distributed networks[J]. Chinese Journal of Network and Information Security, 2018,4(9): 23-35.
|
[19] |
LEIS V , KEMPER A , NEUMANN T . The adaptive radix tree:ARTful indexing for main-memory databases[J]. IEEE Computer Society, 2013,1: 38-49.
|
[20] |
张仕将, 柴晶, 陈泽华 ,等. 基于Gossip协议的拜占庭共识算法[J]. 计算机科学, 2018,45(2): 20-24.
|
|
ZHANG S J , CHAI J , CHEN Z H ,et al. Byzantine consensus algorithm based on Gossip protocol[J]. Computer Science, 2018,45(2): 20-24.
|