[1] 李兆森,李彩虹.基于区块链的电子数据存证应用研究[J].软件,2017, 38(8):63-67. Li Z S, Li C H. Application research of electronic data storage based on blockchain[J]. Software, 2017, 38(8):63-67.(in Chinese) [2] 曹迪迪,陈伟.基于智能合约的以太坊可信存证机制[J].计算机应用,2019, 39(4):1073-1080. Cao D D, Chen W. Ethereum trusted deposit mechanism based on smart contract[J]. Journal of Computer Applications, 2019, 39(4):1073-1080.(in Chinese) [3] Cebe M, Erdin E, Akkaya K, et al. Block4Forensic:an integrated lightweight blockchain framework for forensics applications of connected vehicles[J]. IEEE Communications Magazine, 2018, 56(10):50-57. [4] Kevin D, David B. HACIT2:a privacy preserving, region based and blockchain application for dynamic navigation and forensics in VANET[C]//International Conference on Ad Hoc Networks. Cham:Springer, 2018. [5] Bonomi S, Casini M, Ciccotelli C. B-CoC:a blockchain-based chain of custody for evidences management in digital forensics[J]. https://dblp.org/db/journals/corr/corr1807.html#abs-1807-10359 [6] 吴泽,李娜.基于Java的Socket模型通讯实现[J].许昌学院学报,2010, 29(2):74-77. Wu Z, Li N. Java-based socket model communication implementation[J]. Journal of Xuchang University, 2010, 29(2):74-77.(in Chinese) [7] 王静,曲凤娟.基于Socket的多用户并发通信的设计[J].福建电脑,2007(3):164-165. Wang J, Qu F J. Design of multi-user concurrent communication based on socket[J]. Fujian Computer, 2007(3):164-165.(in Chinese) [8] 王防修,周康.通过哈夫曼编码实现文件的压缩与解压[J].武汉轻工大学学报,2008, 27(4):46-49. Wang F X, Zhou K. Compression and decompression of files by Huffman coding[J]. Journal of Wuhan University of Light Industry, 2008, 27(4):46-49.(in Chinese) [9] Koo D, Shin Y, Yun J, et al. An online data-oriented authentication based on Merkle tree with improved reliability[C]//IEEE International Conference on Web Services. IEEE, 2017. [10] Jones P. US secure Hash algorithm 1(SHA1)[M]. RFC Editor, 2001. [11] 夏沅.区块链智能合约技术应用[J].中国金融,2018(6):81-82. Xia Y. Application of smart contract technology in blockchain[J]. China Finance, 2018(6):81-82.(in Chinese) [12] 黄洁华,高灵超,许玉壮,等.众筹区块链上的智能合约设计[J].信息安全研究, 2017, 3(3):211-219. Huang J H, Gao L C, Xu Y Z, et al. Smart contract design on crowdfunding blockchain[J]. Information Security Research, 2017, 3(3):211-219.(in Chinese) [13] Kosba A, Miller A, Shi E. Hawk:the blockchain model of cryptography and privacypreserving smart contracts[J]. IEEE Symposium on Security and Privacy, 2016:839-858. [14] Muñoz J L, Forné J, Esparza O, et al. Efficient certificate revocation system implementation:Huffman Merkle Hash tree (HuffMHT)[M]//Trust, Privacy, and Security in Digital Business, 2005. [15] Zhou X W, Guo J W. HuffMHT-based entity authentication scheme for Ad Hoc networks[J]. Journal of Electronics&Information Technology, 2010, 32(4):852-856. [16] 王防修,周康.通过哈夫曼编码实现文件的压缩与解压[J].武汉轻工大学学报,2008, 27(4):46-49. Wang F X, Zhou K. Compression and decompression of files via Huffman coding[J]. Journal of Wuhan University of Light Industry, 2008, 27(4):46-49.(in Chinese) [17] Sediyono E, Santoso K I, Suhartono. Secure login by using one-time password authentication based on MD5 Hash encrypted SMS[C]//International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013:1604-1608. [18] Shrivastava A. Implementation of cryptographic Hash function SHA256 in C++[C]//APS March Meeting 2012. American Physical Society, 2012. |