[1] |
唐坤剑, 冯光辉 . 大规模网络跨域云安全访问控制方法仿真[J]. 计算机仿真, 2023,40(2): 434-437,529.
|
|
TANG K J , FENG G H . Simulation of cross domain cloud security access control methods for large-scale networks[J]. Computer Simulation, 2023,40(2): 434-437,529.
|
[2] |
刘东, 任海玲 . 基于差分隐私的大数据安全访问权限认证仿真[J]. 计算机仿真, 2021,38(8): 421-424,486.
|
|
LIU D , REN H L . Big data security access authentication simulation based on differential privacy[J]. Computer Simulation, 2021,38(8): 421-424,486.
|
[3] |
郑荣, 高志豪, 魏明珠 ,等. 基于联盟区块链的政府数据协同治理平台框架研究:以全国碳排放权交易市场为例[J]. 情报学报, 2022,41(10): 1071-1084.
|
|
ZHENG R , GAO Z H , WEI M Z ,et al. Framework of the government-data collaborative governance platform based on the alliance blockchain:considering the national carbon emissions trading market as an example[J]. Journal of the China Society for Scientific and Technical Information, 2022,41(10): 1071-1084.
|
[4] |
朱向荣, 吴鸿祜, 胡伟 . FactChain:一个基于区块链的众包知识融合系统[J]. 软件学报, 2022,33(10): 3546-3564.
|
|
ZHU X R , WU H H , HU W . FactChain:a blockchain-based crowdsourcing knowledge fusion system[J]. Journal of Software, 2022,33(10): 3546-3564.
|
[5] |
赖业宁, 封科, 于同伟 ,等. 基于 DHT 和区块链技术的电网安全稳定控制终端分布式认证[J]. 中国电力, 2022,55(4): 44-53.
|
|
LAI Y N , FENG K , YU T W ,et al. Distributed authentication of power grid safety and stability control terminals based on DHT and blockchain[J]. Electric Power, 2022,55(4): 44-53.
|
[6] |
杨坤伟, 杨波, 周彦伟 . 群智网络中基于区块链的有序聚合签名认证方案[J]. 电子学报, 2022,50(2): 358-365.
|
|
YANG K W , YANG B , ZHOU Y W . A sequential aggregate signature authentication scheme based on blockchain for crowdsensing system[J]. Acta Electronica Sinica, 2022,50(2): 358-365.
|
[7] |
宋涛, 李秀华, 李辉 ,等. 大数据时代下车联网安全加密认证技术研究综述[J]. 计算机科学, 2022,49(4): 340-353.
|
|
SONG T , LI X H , LI H ,et al. Overview of research on security encryption authentication technology of IoV in big data era[J]. Computer Science, 2022,49(4): 340-353.
|
[8] |
廉文娟, 赵朵朵, 范修斌 ,等. 基于认证及区块链的 CFL BLP_BC模型[J]. 计算机科学, 2021,48(11): 36-45.
|
|
LIAN W J , ZHAO D D , FAN X B ,et al. CFL BLP BC model based on authentication and blockchain[J]. Computer Science, 2021,48(11): 36-45.
|
[9] |
张利华, 张赣哲, 曹宇 ,等. 基于区块链的智能家居认证与访问控制方案[J]. 计算机应用研究, 2022,39(3): 863-867,873.
|
|
ZHANG L H , ZHANG G Z , CAO Y ,et al. Authentication and access control scheme for smart home based on blockchain[J]. Application Research of Computers, 2022,39(3): 863-867,873.
|
[10] |
耿文莉, 高梦瑜 . 基于灰色神经网络的云平台大数据安全风险评估[J]. 科学技术与工程, 2021,21(28): 11932-11937.
|
|
GENG W L , GAO M Y . Security risk assessment of big data on cloud platform based on grey neural network[J]. Science Technology and Engineering, 2021,21(28): 11932-11937.
|
[11] |
张山山 . 基于区块链的舰船航行大数据共享安全认证研究[J]. 舰船科学技术, 2021,43(18): 82-84.
|
|
ZHANG S S . Research on security authentication of ship navigation big data sharing based on blockchain[J]. Ship Science and Technology, 2021,43(18): 82-84.
|
[12] |
彭红艳, 李杰, 石贞奎 ,等. 一种基于区块链可验证的加密图像检索方案[J]. 计算机工程, 2022,48(2): 25-33,39.
|
|
PENG H Y , LI J , SHI Z K ,et al. A blockchain-based verifiable encrypted image retrieval scheme[J]. Computer Engineering, 2022,48(2): 25-33,39.
|
[13] |
黄更生, 黄宇红, 郭漫雪 ,等. DT 时代面向数据服务的新型基础设施架构[J]. 电信科学, 2022,38(7): 138-145.
|
|
HUANG G S , HUANG Y H , GUO M X ,et al. Architecture of a new infrastructure for data service in DT era[J]. Telecommunications Science, 2022,38(7): 138-145.
|
[14] |
李养群, 张登银 . 物品万维网资源管理框架研究与应用[J]. 物联网学报, 2022,6(2): 50-64.
|
|
LI Y Q , ZHANG D Y . Research and application of Web of things resource management framework[J]. Chinese Journal on Internet of Things, 2022,6(2): 50-64.
|
[15] |
晏燕, 丛一鸣, MAHMOOD A ,等. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022,43(1): 203-216.
|
|
YAN Y , CONG Y M , MAHMOOD A ,et al. Statistics release and privacy protection method of location big data based on deep learning[J]. Journal on Communications, 2022,43(1): 203-216.
|
[16] |
林楠, 吴林峰, 方洪波 . 大数据环境下电力网络数据安全入侵模型仿真[J]. 现代电子技术, 2022,45(4): 118-122.
|
|
LIN N , WU L F , FANG H B . Simulation of intrusion model for power network data security in big data environment[J]. Modern Electronics Technique, 2022,45(4): 118-122.
|
[17] |
牛淑芬, 方丽芝, 宋蜜 ,等. 智慧城市中隐私保护性广播加密算法[J]. 计算机工程与科学, 2022,44(6): 1003-1012.
|
|
NIU S F , FANG L Z , SONG M ,et al. Privacy-preserving broadcast encryption in smart city[J]. Computer Engineering &Science, 2022,44(6): 1003-1012.
|
[18] |
曾智勇, 洪睿, 李祥林 . 物联网下差异设备兼容数据安全访问控制模型研究[J]. 自动化仪表, 2022,43(8): 112-117.
|
|
ZENG Z Y , HONG R , LI X L . Research on disparate device compatible data security access control model under IoT[J]. Process Automation Instrumentation, 2022,43(8): 112-117.
|
[19] |
谭继安 . 基于决策树和混合神经网络的大数据攻击增量检测研究[J]. 计算机应用与软件, 2022,39(7): 329-335,349.
|
|
TAN J A . Incremental detection for big data attacks based on decision tree and hybrid neural network[J]. Computer Applications and Software, 2022,39(7): 329-335,349.
|
[20] |
刘龙庚 . 基于异构网络空管安全监控关联算法研究[J]. 信息网络安全, 2022(4): 58-66.
|
|
LIU L G . Research on association algorithm of heterogeneous network security monitoring[J]. Netinfo Security, 2022(4): 58-66.
|
[21] |
殷昱煜, 叶炳跃, 梁婷婷 ,等. 边缘计算场景下的多层区块链网络模型研究[J]. 计算机学报, 2022,45(1): 115-134.
|
|
YIN Y Y , YE B Y , LIANG T T ,et al. Research on multi-layer blockchain network model in edge computing[J]. Chinese Journal of Computers, 2022,45(1): 115-134.
|
[22] |
王育齐, 陈庚, 钱伟中 . 区块链环境下用户身份匿名的量子委托计算协议[J]. 电子科技大学学报, 2022,51(6): 802-811.
|
|
WANG Y Q , CHEN G , QIAN W Z . Quantum delegate computing protocol with anonymous user identity in blockchain scenario[J]. Journal of University of Electronic Science and Technology of China, 2022,51(6): 802-811.
|
[23] |
黄晓舸, 刘鑫, 何勇 ,等. 基于区块链的雾网络中的任务卸载优化方案研究[J]. 电子与信息学报, 2022,44(7): 2440-2448.
|
|
HUANG X G , LIU X , HE Y ,et al. Research on optimization scheme of task offloading in blockchain-enabled fog networks[J]. Journal of Electronics & Information Technology, 2022,44(7): 2440-2448.
|
[24] |
钟运琴, 朱月琴, 焦守涛 . 边缘大数据分析预测建模方法研究[J]. 高技术通讯, 2022,32(10): 1067-1075.
|
|
ZHONG Y Q , ZHU Y Q , JIAO S T . Research on edge big data analysis and predictive modeling method[J]. Chinese High Technology Letters, 2022,32(10): 1067-1075.
|
[25] |
杨昌霖, 王继光, 汪清 . 无线物联网中局部有向无环图区块链研究[J]. 计算机应用研究, 2022,39(9): 2597-2602.
|
|
YANG C L , WANG J G , WANG Q . Local directed acyclic graph blockchain in wireless Internet of Things[J]. Application Research of Computers, 2022,39(9): 2597-2602.
|
[26] |
李娜, 周瑛, 曹丽娜 . 串口服务器内外网数据安全通信方法仿真[J]. 计算机仿真, 2022,39(7): 208-212.
|
|
LI N , ZHOU Y , CAO L N . Simulation of secure data communication method between internal and external network of serial port server[J]. Computer Simulation, 2022,39(7): 208-212.
|
[27] |
姚云霞, 张国权 . 区块链数据防篡改备份恢复算法与仿真[J]. 计算机仿真, 2022,39(11): 411-415.
|
|
YAO Y X , ZHANG G Q . Algorithm and simulation for blockchain data tamper-proof backup and recovery[J]. Computer Simulation, 2022,39(11): 411-415.
|