[1] 李兆森,李彩虹.基于区块链的电子数据存证应用研究[J].软件,2017, 38(8):63-67. Li J S, Li C H. Research on application of electronic evidence based on blockchain[J]. Computer Engineering&Software, 2017, 38(8):63-67.(in Chinese) [2] 张岩,梁耀丹.基于区块链技术的去中心化数字出版平台研究[J].出版科学,2017, 25(6):13-18. Zhang Y, Liang Y D. Research on decentralized digital publishing platform based on block chain technology[J]. Publishing Journal, 2017, 25(6):13-18.(in Chinese) [3] 陈伟利,郑子彬.区块链数据分析:现状、趋势与挑战[J].计算机研究与发展,2018, 55(9):1853-1870. Chen W L, Zheng Z B. Blockchain data analysis:a review of status, trends and challenges[J]. Journal of Computer Research and Development, 2018, 55(9):1853-1870.(in Chinese) [4] 孙国梓,王纪涛.浅析区块链取证与存证[J].中国信息安全,2019(5):61-64. Sun G Z, Wang J T. Analysis of blockchain forensics and storage[J]. China Information Security, 2019(5):61-64.(in Chinese) [5] 刘品新.电子取证的法律规制[J].法学家,2010(3):73-82, 178. Liu P X. On the legal regulation of E-discovery[J]. Jurists Review, 2010(3):73-82, 178.(in Chinese) [6] 尚蕾.基于区块链技术的电子数据取证研究综述[J].办公自动化,2019, 24(10):33-34. Shang L. Survey on forensics techniques of electronic evidence in blockchain[J]. Mobile Office, 2019, 24(10):33-34.(in Chinese) [7] Hyla T, Pejaś J. EHealth integrity model based on permissioned blockchain[J]. Future Internet, 2019, 11(3):76. [8] 冒小乐,陈鼎洁,孙国梓.基于区块链的电子数据存证的设计与实现[J].中兴通讯术,2018, 24(6):28-34. Mao X L, Chen D J, Sun G Z. Design and implementation of electronic data storage and certificate system based on blockchain[J]. ZTE Technology Journal, 2018, 24(6):28-34.(in Chinese) [9] 黄晓芳,徐蕾,杨茜.一种区块链的云计算电子取证模型[J].北京邮电大学学报,2017, 40(6):120-124. Huang X F, Xu L, Yang X. Blockchain model of cloud forensics[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40(6):120-124.(in Chinese) [10] 黄永洪,刘宇超,凌国玮,等.基于私有链的存证云盘系统方案设计[J].信息技术与标准化, 2018(7):16-20. Huang Y H, Liu Y C, Ling G W, et al. Scheme design of cloud storage system based on private chain[J]. Information Technology&Standardization, 2018(7):16-20.(in Chinese) [11] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2017-05-29]. HTTP://www.bitcoin.org/bitcoin.pdf. [12] Castro M, Liskov B. Practical Byzantine fault tolerance[C]//Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. New Orleans, USA:OSDI, 1999:173-186. [13] King S, Nadal S. PPCoin:peer-to-peer crypto-currency with proof-of-stake. 2012.https://peercoin.net/assets/paper/peercoin-paper.pdf. [14] 长铗.从数字货币到信用社会[M].北京:中信出版社,2018. [15] 李立耀,孙鲁敬,杨家海.社交网络研究综述[J].计算机科学,2015, 42(11):8-21, 42. Li L Y, Sun L J, Yang J H. Research on online social network[J]. Computer Science, 2015, 42(11):8-21, 42.(in Chinese) [16] 徐晨初,张燕平,刘国涛.一种优化路径的聚焦爬虫爬行策略[J].小型微型计算机系统, 2016, 37(8):1721-1724. Xu C C, Zhang Y P, Liu G T. Novel focused crawler algorithm for optimizing crawling pathways[J]. Journal of Chinese Computer Systems, 2016, 37(8):1721-1724.(in Chinese) [17] 宾晟,孙更新,周双.基于区块链技术的社交网络中舆情传播模型[J].应用科学学报,2019, 37(2):191-202. Bin S, Sun G X, Zhou S. Public opinion propagation model in social network based on blockchain[J]. Journal of Applied Sciences, 2019, 37(2):191-202.(in Chinese) [18] 邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018, 41(5):969-988. Shao Q F, Jin C Q, Zhang Z, et al. Blockchain:architecture and research progress[J]. Computer Science, 2018, 41(5):969-988.(in Chinese) [19] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展, 2017, 54(10):2170-2186. Zhu H L, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10):2170-2186.(in Chinese) [20] 谭海波,周桐,赵赫,等.基于区块链的档案数据保护与共享方法[J/OL].软件学报,2019, 30(9):2620-2635. Tan H B, Zhou T, Zhao H, et al. Archives data protection and sharing method based on blockchain[J/OL]. Journal of Software, 2019, 30(9):2620-2635.(in Chinese) [21] 张超,李强,陈子豪,等. Medical Chain:联盟式医疗区块链系统[J/OL].自动化学报, 2019, 45(8):1495-1510. Zhang C, Li Q, Chen Z H, et al. Medical chain:alliance medical blockchain system[J/OL]. Acta Automatica Sinica, 2019, 45(8):1495-1510.(in Chinese) [22] 韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019, 45(1):206-225. Han X, Yuan Y, Wang F Y. Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(1):206-225.(in Chinese) [23] 闵新平,李庆忠,孔兰菊,等.许可链多中心动态共识机制[J].计算机学报, 2018, 41(5):1005-1020. Min X P, Li Q Z, Kong L J, et al. Permissioned blockchain dynamic consensus mechanism based multi-centers[J]. Chinese Journal of Computers, 2018, 41(5):1005-1020.(in Chinese) [24] 袁勇,倪晓春,曾帅,等.区块链共识算法的发展现状与展望[J/OL].自动化学报,2018, 44(11):2011-2022. Yuan Y, Ni X C, Zeng S, et al. Blockchain consensus algorithms:the state of the art and future trends[J/OL]. Acta Automatica Sinica, 2018, 44(11):2011-2022.(in Chinese) [25] 武岳,李军祥.区块链共识算法演进过程[J].计算机应用研究,2019:1-9.[2019-11-28]. https://DOI/10.19734/j.issn.1001-3695.2019.02.0004. Wu Y, Li J X. Evolution process of blockchain consensus algorithm[J]. Application Research of Computers, 2019:1-9.[2019-11-28]. https://DOI/10.19734/j.issn.1001-3695.2019.02.0004.(in Chinese) [26] 佘维,陈建森,刘琦,等.一种面向医疗大数据安全共享的新型区块链技术[J].小型微型计算机系统,2019, 40(7):1449-1454. She W, Chen J S, Liu Q, et al. New blockchain technology for medical big datas security sharing[J]. Journal of Chinese Computer Systems, 2019, 40(7):1449-1454.(in Chinese) [27] 武勇,李斌.区块链安全技术体系研究[J].信息安全与通信保密,2018(7):44-52. Wu Y, Li B. Research on blockchain security technology architecture[J]. Information Security and Communications Privacy, 2018(7):44-52.(in Chinese) [28] 邓毅,陈秀清,王志豪,等.基于区块链的隐私安全保护可行性分析[J].软件导刊,2019, 18(1):166-168. Deng Y, Chen X Q, Wang Z H, et al. Blockchain-based privacy security protection feasibility analysis[J]. Software Guide, 2019, 18(1):166-168.(in Chinese) [29] 宋宪荣,张猛.网络可信身份认证技术问题研究[J].网络空间安全,2018, 9(3):69-77. Song X R, Zhang M. Research on the technology of network trusted identity authentication[J]. Cyberspace Security, 2018, 9(3):69-77.(in Chinese) [30] 唐长兵,杨珍,郑忠龙,等. PoW共识算法中的博弈困境分析与优化[J].自动化学报,2017, 43(9):1520-1531. Tang C B, Yang Z, Zheng Z L, et al. Game dilemma analysis and optimization of pow consensus algorithm[J]. Acta Automatica Sinica, 2017, 43(9):1520-1531.(in Chinese) [31] 孙国钰.浅谈对区块链的攻击方式与安全性[J].网络安全技术与应用,2018(8):26-27. Sun G Y. On the attack mode and security of blockchain[J]. Network Security Technology&Application, 2018(8):26-27.(in Chinese) [32] Nayak K, Kumar S, Miller A, et al. Stubborn mining:generalizing selfish mining and combining with an eclipse attack[C]//Proceedings of the 2016 IEEE European Symposium on Security and Privacy, 2016:305-320. DOI:10.1109/Euro SP.2016.32. [33] 叶聪聪,李国强,蔡鸿明,等.区块链的安全检测模型[J].软件学报,2018, 29(5):1348-1359. Ye C C, Li G Q, Cai H M, et al. Security detection model of blockchain[J]. Journal of Software, 2018, 29(5):1348-1359.(in Chinese) |