[1] |
郭锐 . 匿名通信系统流量伪装技术研究[D]. 北京:北京邮电大学, 2018.
|
|
GUO R . Traffic camouflaging in anonymous communication system[D]. Beijing:Beijing University of Posts and Telecommunications, 2018.
|
[2] |
张琰, 王瑾璠, 齐竹云 ,等. 基于动态累加器的去中心化加密搜索方案[J]. 网络与信息安全学报, 2019,5(2): 23-29.
|
|
ZHANG Y , WANG J F , QI Z Y ,et al. Decentralized searchable en cryption scheme based on dynamic accumulator[J]. Chinese Journal of Network and Information Security, 2019,5(2): 23-29.
|
[3] |
VACCA J R . Computer and information security handbook[M]. Boston: ElsevierPress, 2009.
|
[4] |
彭博, 刘进, 龚智 ,等. 一种树型桥CA跨域信任传递方案研究[J]. 舰船电子工程, 2017,37(3): 66-69,113.
|
|
PENG B , LIU J , GONG Z ,et al. Cross-domain trust model based on bridge CA[J]. Ship Electronic Engineering, 2017,37(3): 66-69,113.
|
[5] |
PERLMAN R . An overview of PKI trust model[J]. IEEE Network, 1999,13(6): 38-43.
|
[6] |
ROUIBAH K , OULD-ALI S . Dynamic data sharing and security in a collaborative product definition management system[J]. Robotics and Computer Integrated Manufacturing, 2006,23(2).
|
[7] |
杨斌, 陈国庆, 孙永红 . 一种新的基于身份的多信任域认证方案研究[J]. 计算机安全, 2010(8): 15-18.
|
|
YANG B , CHEN G Q , SUN Y H . Research of a new identity-based authentication model for multi-domain[J]. Computer Security, 2010(8): 15-18.
|
[8] |
CHAN Y Y , FLEISSNER S , LIU J K ,et al. Single sign-on and key establishment for ubiquitous smart environments[C]// International Conference on Computational Science and Its Applications. Berlin:Springer, 2006: 406-415.
|
[9] |
戴千一, 徐开勇, 郭松 ,等. 分布式网络环境下基于区块链的密钥管理方案[J]. 网络与信息安全学报, 2018,4(9): 23-35.
|
|
DAI Q Y , XUN K Y , GUO S ,et al. Blockchain-based key management scheme for distributed networks[J]. Chinese Journal of Network and Information Security, 2018,4(9): 23-35.
|
[10] |
刘亚辉 . 基于区块链的可信电子券系统的设计与实现[D]. 北京:北京邮电大学, 2018.
|
|
LIU Y H . Design and implementation of trusted electronic coupons system based on block-chain[D]. Beijing:Beijing University of Posts and Telecommunications, 2018.
|
[11] |
SUN Y , YU Y , LI X ,et al. Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations[C]// Australasian Conference on Information Security and Privacy. 2016: 293-309.
|
[12] |
GARG S , GENTRY C , HALEVI S . Candidate multilinear maps from ideal lattices[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013: 1-17.
|
[13] |
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[C]// Theory of Cryptography Conference. 2005: 325-341.
|
[14] |
LAMPORT S , PEASE M . The byzantine generals problem[M]. IEEE Computer Society Press, 1995.
|
[15] |
王娜 . 无线传感网节点信任检测量化方案与方法研究[D]. 上海:华东师范大学, 2015.
|
|
WANG N . Research on quantitative trust detecting method and model for nodes in WSNs[D]. Shanghai:East China Normal University, 2015.
|
[16] |
CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems (TOCS), 2002,20(4): 398-461.
|
[17] |
沈鑫, 裴庆祺, 刘雪峰 . 区块链技术综述[J]. 网络与信息安全学报, 2016,2(11): 11-20.
|
|
SHEN X , PEI Q Q , LIU X F . Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016,2(11): 11-20.
|
[18] |
蔡维德, 郁莲, 王荣 ,等. 基于区块链的应用系统开发方法研究[J]. 软件学报, 2017,28(6): 1474-1487.
|
|
CAI W D , YU L , WANG R ,et al. Blockchain application development techniques[J]. Journal of Software, 2017,28(6): 1474-1487.
|
[19] |
张文芳, 王小敏, 郭伟 ,等. 基于椭圆曲线密码体制的高效虚拟企业跨域认证方案[J]. 电子学报, 2014,42(6): 1095-1102.
|
|
ZHANG W F , WANG X M , GUO W ,et al. An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem[J]. Acta Electronica Sinica, 2014,42(6): 1095-1102.
|
[20] |
罗长远, 霍士伟, 邢洪智 . 普适环境中基于身份的跨域认证方案[J]. 通信学报, 2011,32(9): 111-115,122.
|
|
LUO C Y , HUO S W , XING H Z . Identity-based cross-domain authentication scheme in pervasive computing environments[J]. Journal on Communications, 2011,32(9): 111-115,122.
|