[1] 中国信息通信研究院. 数据要素白皮书. [EB/OL]. (2023-09-18) [2025-01-02]. Retrieved from http://www.caict.ac.cn/english/research/whitepapers/202311/P020231103487266783845.pdf. [2] 国务院. 关于印发《关于加强数据资产管理的指导意见》 的通知[EB/OL]. (2023-12-31) [2025-01- 02]. https://www.gov.cn/zhengce/zhengceku/202401/content_6925470.htm. [3] Wei X, Yan Y, Guo S, et al. Secure data sharing: blockchain-enabled data access controlframework for IoT [J]. IEEE Internet of Things Journal, 2021, 9(11): 8143-8153. [4] Luka M K, Okereke O U, Omizegba E E, et al. Blockchains for spectrum management in wireless networks: a survey [DB/OL]. (2021-06-11) [2025-01-02]. https://arxiv.org/abs/2107.01005. [5] Chen L, Lim H W, Yang G. Cross-domain password-based authenticated key exchange revisited [J]. ACM Transactions on Information and System Security (TISSEC), 2014, 16(4): 1-32. [6] 赵国威. 安全协议形式化自动验证工具AVISPA的研究[D]. 长春: 吉林大学, 2014. [7] Jiang L, Chang X, Liu Y, et al. Performance analysis of hyperledger fabric platform: a hierarchical model approach [J]. Peer-to-Peer Networking and Applications, 2020, 13: 1014- 1025. [8] Khalil U, Malik O A, Hong O W, et al. Leveraging a novel NFT-enabled blockchain architecture for the authentication of IoT assets in smart cities [J]. Scientific Reports, 2023, 13(1): 19785. [9] Shen M, Liu H, Zhu L, et al. Blockchain-assisted secure device authentication for cross-domain industrial IoT [J]. IEEE Journal on Selected Areas in Communications, 2020, 38(5): 942-954. [10] Sanka A I, Irfan M, Huang I, et al. A survey of breakthrough in blockchain technology: adoptions, applications, challenges and future research [J]. Computer Communications, 2021, 169: 179-201. [11] Kapoor V, Abraham V S, Singh R. Elliptic curve cryptography [J]. Ubiquity, 2008: 1-8. [12] Fang X, Wu Y. Investigation into the elliptic curve cryptography [C]//20173rd International Conference on Information Management (ICIM). IEEE, 2017: 412-415. [13] Chen J, Zhan Z, He K, et al. XAuth: efficient privacy-preserving cross-domain authentication [J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(5): 3301-3311. [14] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]//13th ACM conference on Computer and Communications Security, 2006: 89-98. [15] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. (2008-10-31) [2025-01-02]. https://nakamotoinstitute.org/library/bitcoin. [16] Fan K, Ren Y, Yan Z, et al. Secure time synchronization scheme in IoT based on blockchain [C]//2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018: 1063-1068. [17] European Commission. Digital Decade 2024: eGovernment Benchmark [EB/OL]. (2024-06-02) [2025-01-02]. https://digital-strategy.ec.europa.eu/en/library/digital-decade-2024-egovernmentbenchmark. [18] Rahulamathavan Y, Phan R C W, Rajarajan M, et al. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption [C]//2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2017: 1-6. |