[1] |
MATHUR S , ARORA A . Internet of things (IoT) and PKI-based Security Architecture[M]// Industrial Internet of Things and Cyber-Physical Systems:Transforming the Conventional to Digital. 2020: 25-46.
|
[2] |
SERRANO N , HADAN H , CAMP L J . A complete study of PKI (PKI’s Known Incidents)[J]. SSRN Electronic Journal, 2019(47).
|
[3] |
KAMINSKY D , PATTERSON M L , SASSAMAN L . PKI layer cake:new collision attacks against the global X.509 infrastructure[C]// International Conference on Financial Cryptography and Data Security. 2010: 289-303.
|
[4] |
PRINS J R , CYBERCRIME B U . DigiNotar certificate authority breach “operation black tulip”[J]. Fox-IT, 2011,(11): 18.
|
[5] |
DAVIDSON S , DE FILIPPI P , POTTS J . Blockchains and the economic institutions of capitalism[J]. Journal of Institutional Economics, 2018,14(4): 639-658.
|
[6] |
FROMKNECHT C , VELICANU D , YAKOUBOV S . Certcoin:a namecoin based decentralized authentication system6.857 class project[J]. Unpublished Class Project, 2014.
|
[7] |
AXON L , GOLDSMITH M . PB-PKI:a privacy-aware blockchain-based PKI[C]// SECRYPT. 2017: 311-318.
|
[8] |
MATSUMOTO S , REISCHUK R M . IKP:turning a PKI around with decentralized automated incentives[C]// 2017 IEEE Symposium on Security and Privacy (SP). 2017: 410-426.
|
[9] |
CHEN J , YAO S , YUAN Q ,et al. Certchain:public and efficient certificate audit based on blockchain for tls connections[C]// IEEE INFOCOM 2018-IEEE Conference on Computer Communications. 2018: 2060-2068.
|
[10] |
KUBILAY M Y , KIRAZ M S , MANTAR H A . CertLedger:a new PKI model with certificate transparency based on blockchain[J]. Computers & Security, 2019,85: 333-352.
|
[11] |
马晓婷, 马文平, 刘小雪 . 基于区块链技术的跨域认证方案[J]. 电子学报, 2018,46(11): 2571-2579.
|
|
MA X T , MA W P , LIU X X . A cross domain authentication scheme based on blockchain technology[J]. Acta Electronica Sinica, 2018,46(11): 2571-2579.
|
[12] |
王昊, 吴天昊, 朱孔林 ,等. 交叉口场景下基于区块链技术的匿名车辆身份认证方案[J]. 网络与信息安全学报, 2020,6(5): 27-35.
|
|
WANG H , WU T H , ZHU K L ,et al. Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario[J]. Chinese Journal of Network and Information Security, 2020,6(5): 27-35.
|
[13] |
张勖, 马欣 . 基于区块链的轻量化移动自组网认证方案[J]. 网络与信息安全学报, 2020,6(4): 14-22.
|
|
ZHANG X , MA X . Lightweight mobile Ad Hoc network authentication scheme based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(4): 14-22.
|
[14] |
LAMPORT L , FISCHER M . Byzantine generals and transaction commit protocols[R]. Technical Report 6. 1982.
|
[15] |
CASTRO M , LISKOV B . Practical byzantine fault tolerance[C]// OSDI. 1999: 173-186.
|
[16] |
HAO X , YU L , ZHIQIANG L ,et al. Dynamic practical byzantine fault tolerance[C]// 2018 IEEE Conference on Communications and Network Security (CNS). 2018: 1-8.
|
[17] |
LI F , LIU K , LIU J ,et al. DHBFT:Dynamic hierarchical byzantine fault-tolerant consensus mechanism based on credit[C]// Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. 2020: 3-17.
|
[18] |
CHARITON A A , DEGKLERI E , PAPADOPOULOS P ,et al. CCSP:a compressed certificate status protocol[C]// IEEE INFOCOM 2017-IEEE Conference on Computer Communications. 2017: 1-9.
|
[19] |
BASIN D , CREMERS C , KIM T H J ,et al. ARPKI:Attack resilient public-key infrastructure[C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 382-393.
|
[20] |
CHEN J , YAO S , YUAN Q ,et al. Checks and balances:a tripartite public key infrastructure for secure Web-based connections[C]// IEEE INFOCOM 2017-IEEE Conference on Computer Communications. 2017: 1-9.
|