中共中央政治局10月24日下午就区块链技术发展现状和趋势进行第十八次集体学习。习近平总书记在主持学习时发表了重要讲话。他指出,区块链技术应用已延伸到数字金融、物联网、智能制造、供应链管理、数字资产交易等多个领域。目前,全球主要国家都在加快布局区块链技术发展。我国在区块链领域拥有良好基础,要加快推动区块链技术和产业创新发展,积极推进区块链和经济社会融合发展。
《网络与信息安全学报》自创刊来,陆续出版了16 篇以“区块链技术”为主题的文章,现将其整理汇总如下,欢迎各位读者参考引用。其中,由沈鑫、裴庆祺、刘雪峰撰写的《区块链技术综述》一文,截至目前,在知网的下载次数为14244,引用次数为198。
[1]朱建明, 付永贵. 基于区块链的供应链动态多中心协同认证模型[J]. 网络与信息安全学报, 2016, 2(1): 27-33.
ZHU J M, FU Y G. Supply chain dynamic multi-center coordination authentication model based on block chain[J]. Chinese Journal of Network and Information Security, 2016, 2(1): 27-33.
[2]沈鑫,裴庆祺,刘雪峰 .区块链技术综述[J]. 网络与信息安全学报, 2016, 2(11): 11-20.
SHEN X,PEI Q Q,LIU X F. Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016, 2(11): 11-20.
[3]HU W H, AO M, SHI L, et al. Review of blockchain-based DNS alternatives[J]. 网络与信息安全学报, 2017, 3(3): 71-77.
HU W H, AO M, SHI L, et al. Review of blockchain-based DNS alternatives[J]. Chinese Journal of Network and Information Security, 2017, 3(3): 71-77.
[4]董友康, 张大伟, 韩臻, 等. 基于联盟区块链的董事会电子投票系统[J]. 网络与信息安全学报, 2017, 3(12): 17-23.
DONG Y K, ZHANG D W, HAN Z, et al. Board voting system based on the consortium blockchains[J]. Chinese Journal of Network and Information Security, 2017, 3(12): 17-23.
[5]章峰, 史博轩, 蒋文保. 区块链关键技术及应用研究综述[J]. 网络与信息安全学报, 2018, 4(4): 22-29.
ZHANG F, SHI B X, JIANG W B. Review of key technology and its application of blockchain[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 22-29.
[6]郭树行, 宋子琦. 面向征信的区块链模式设计与应用研究[J]. 网络与信息安全学报, 2018, 4(4): 63-71.
SONG S X, SONG Z Q. Design and application of blockchain pattern for credit information industry[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 63-71.
[7]李莉, 周斯琴, 刘芹, 等. 基于区块链的数字版权交易系统[J]. 网络与信息安全学报, 2018, 4(7): 22-29.
LI L, ZHOU S Q, LIU Q, et al. Blockchain-based digital copyright trading system[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 22-29.
[8]李春燕, 赵佳, 刘吉强, 等. 车载自组织网络中基于区块链的路况预警方案[J]. 网络与信息安全学报, 2018, 4(7): 39-47.
LI C Y, ZHAO J, LIU J Q, et al. Blockchain-based taffic condition early-warning scheme for VANET[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 39-47.
[9]戴千一, 徐开勇, 郭松, 等. 分布式网络环境下基于区块链的密钥管理方案[J]. 网络与信息安全学报, 2018, 4(9): 23-35.
DAI Q Y, XU K Y, GUO S, et al. Blockchain-based key management scheme for distributed network[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 23-35.
[10]刘凡鸣, 石伟. 基于区块链的ARP欺骗攻击防御方法[J]. 网络与信息安全学报, 2018, 4(9): 36-43.
LIU F M, SHI W. Blockchain-based ARP defense scheme[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 36-43.
[11]吴邱涵, 胡卫. 基于SM2算法和区块链的移动端身份认证协议设计[J]. 网络与信息安全学报, 2018, 4(9): 60-65.
WU Q H, HU W. Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 60-65.
[12]赵伟, 张问银, 王九如, 等. 基于区块链的企业管理系统框架设计与分析[J]. 网络与信息安全学报, 2019, 5(2): 13-22.
ZHAO W, ZHANG W Y, WANG J R, et al. Design and analysis of enterprise management system framework based on block-chain[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 13-22.
[13]陈晓, 吕欣冉, 刘志. 基于隐私保护的法定“数字货币”激励机制[J]. 网络与信息安全学报, 2019, 5(2): 30-39.
CHEN X, LYU X R, LIU Z. Truthful incentive mechanism for digital currency based on privacy protection[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 30-39.
[14]丁庆洋,朱建明,张瑾 等.基于双层架构的溯源许可链共识机制. 网络与信息安全学报, 2019, 5(2): 1-12.
DING Q Y,ZHU J M,ZHANG J,etal.Traceability permissioned chain consensus mechanism based on double-layer architecture[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 1-12.
[15] 张琰,王瑾璠,齐竹云,等.基于动态累加器的去中心化加密搜索方案 [J]. 网络与信息安全学报, 2019, 5(2): 23-29..
ZHANG Y,WANG J F,QI ZY,etal.Decentralized searchable encryption scheme based on dynamic accumulator[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 23-29.
[16]包子健, 王庆豪, 张永欣, 等. 可监管的比特币隐私保护混淆服务[J]. 网络与信息安全学报, 2019, 5(4): 40-51.
BAO Z J, WANG Q H, ZHANG Y X, et al. Regulatory Bitcoin privacy-preserving mixing service[J]. Chinese Journal of Net-work and Information Security, 2019, 5(4): 40-51.
附件:《网络与信息安全学报》区块链相关论文下载