[1] Grinberg R.Bitcoin:An Innovative Alternative Digital Currency[J].Hastings Science & Technology Law Journal,2011,(4):160-210.
[2] 侯云春.防范金融风险要有金融技术加持[J].中国商界,2017,(9):24-25. HOU Yun-chun.Financial technology to prevent financial risks[J].Business China,2017,(9):24-25.(in Chinese)
[3] Nayak K,Kumar S,Miller A,et al.Stubborn mining:Generalizing selfish mining and combining with an eclipse attack[A].Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS\\&P)[C].USA:IEEE,2016.305-320.
[4] 程丽辰,刘吉强.区块链技术及其安全问题[J].信息通信技术,2017,11(3):39-45. CHENG Li-chen,LIU Ji-qiang.Technology and security of blockchain[J].Information and Communications Technologies,2017,11(3):39-45.(in Chinese)
[5] Heilman E,Kendler A,Zohar A,et al.Eclipse attacks on bitcoin's peer-to-peer network[A].Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)[C].USA:USENIX,2015.129-144.
[6] 叶聪聪,李国强,蔡鸿明,等.区块链的安全检测模型[J].软件学报,2018,29(05):1348-1359. YE Cong-cong,LI Guo-qiang,CAI Hong-ming,et al.Security detection model of block chain[J].Journal of Software,2018,29(05):1348-1359.(in Chinese)
[7] 邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018,41(05):969-988. SHAO Qi-feng,JIN Che-qing,ZHANG Zhao,et al.Blockchain technology:Architecture and progress[J].Chinese Journal of Computers,2018,41(05):969-988.(in Chinese)
[8] 李赫,孙继飞,杨泳,等.基于区块链2.0的以太坊初探[J].中国金融电脑,2017(6):57-60. LI He,SUN Ji-fei,YANG Yong,et al.Preliminary exploration of Ethereum based on block chain 2.0[J].Financial Computer of China,2017(6):57-60.(in Chinese)
[9] 吴涛,景晓军.一种强不可伪造无证书签名方案的密码学分析与改进[J].电子学报,2018,46(3):602-606. WU Tao,JING Xiao-jun.Cryptanalysis and improvement of a strong non-forgeable certificateless signature scheme[J].Acta Electronica Sinica,2018,46(3):602-606.(in Chinese)
[10] 孙君,熊关.SCMA mMTC系统中基于联盟区块链的无线电资源交易的信用支付[J].电子学报,2019,47(8):1677-1684. SUN Jun,XIONG Guan.Credit payment of radio resource transaction based on alliance blockchain in SCMA mMTC system[J].Acta Electronica Sinica,2019,47(8):1677-1684.(in Chinese)
[11] Saaty T L.A scaling method for priorities in hierarchical structures[J].Journal of Mathematical Psychology,2000,15(3):234-281.
[12] Saaty T L.How to make a decision:The analytic hierarchy process[J].European Journal of Operational Research,1994,24(6):19-43.
[13] WANG D,GUO B,SHEN Y.Method for measuring the privacy level of pre-published dataset[J].IET Information Security,2018,12(5):425-430.
[14] Nakamoto S.Bitcoin:A peer-to-peer electronic cash system.bitcoin.org[J/OL].https://bitcoin.org/bitcoin.pdf (accessed:21.05.2019),2008.
[15] Harel A,Shabtai A,Rokach L,et al.M-Score:A misuseability weight measure[J].IEEE Transactions on Dependable & Secure Computing,2012,9(3):414-428. |