Computer and Modernization ›› 2022, Vol. 0 ›› Issue (03): 30-36.
Previous Articles Next Articles
Online:
2022-04-29
Published:
2022-04-29
ZHANG Tian-xi, WANG Li-peng, ZHOU Chun-tian, YANG Yan-yan, LI Xiao-chong. Secret Content Auditing Scheme in Internet of Things Scenes Based on Blockchain[J]. Computer and Modernization, 2022, 0(03): 30-36.
[1] | 赵文举. 低功耗广覆盖LoRa系统的研究与应用[D]. 北京:北京邮电大学, 2019. |
[2] | 甘志祥. 物联网的起源和发展背景的研究[J]. 现代经济信息, 2010(1):158. |
[3] | 窦轶. 无线传感器网络隐私数据查询技术研究[D]. 南京:南京邮电大学, 2014. |
[4] | 喻旅游. 基于隐私保护和完整性验证的范围查询技术研究[D]. 湘潭:湘潭大学, 2018. |
[5] | 张晓玮. 无线传感网中数据聚合的隐私保护研究[D]. 曲阜:曲阜师范大学, 2019. |
[6] | 张亚如. 无线传感器网络数据查询中隐私保护研究[D]. 重庆:重庆邮电大学, 2016. |
[7] | 刘瑜. 大数据时代下计算机网络信息安全问题探讨[J]. 网络安全技术与应用, 2019(11):68-69. |
[8] | 庄报春. 基于物联网的计算机网络安全分析[J]. 网络安全技术与应用, 2020(3):8-9. |
[9] | 雷婧. 基于LoRaWAN的无线抄表方法的研究与改进[D]. 兰州:兰州大学, 2019. |
[10] | XU J, YANG G, CHEN Z Y, et al. A survey on the privacy-preserving data aggregation in wireless sensor networks[J]. China Communications, 2015,12(5):162-180. |
[11] | GROAT M M, HEY W, FORREST S. KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]// Proceedings of the 2011 IEEE INFOCOM. 2011:2024-2032. |
[12] | OZDEMIR S, XIAO Y. Polynomial regression based secure data aggregation for wireless sensor networks[C]// Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. 2011:1-5. |
[13] | BISTA R, HEE-DAE K, CHANG J W. A new private data aggregation scheme for wireless sensor networks[C]// Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology. 2010:273-280. |
[14] | WANG H, SU Y J, HUANG X H, et al. Algorithm for distributed traffic traces aggregation based on SMC[C]// Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems. 2012:1068-1071. |
[15] | HE W B, NGUYEN H, LIU X, et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks[C]// Proceedings of the 2008 IEEE Military Communications Conference. 2008:1-7. |
[16] | HE W B, LIU X, NGUYEN H, et al. PDA: Privacy-preserving data aggregation in wireless sensor networks[C]// Proceedings of the 2007 26th IEEE International Conference on Computer Communications. 2007:2045-2053. |
[17] | HUA P W, LIU X W, YU J G, et al. Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J]. Procedia Computer Science, 2018,129:188-193. |
[18] | GIRAO J, WESTHOFF D, SCHNEIDER M. CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]// Proceedings of the 2005 IEEE International Conference on Communications. 2005:3044-3049. |
[19] | ELHOSENY M, ELMINIR H, RIAD A, et al. A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption[J]. Journal of King Saud University-Computer Information Sciences, 2016,28(3):262-275. |
[20] | ZHONG H, SHAO L L, CUI J, et al. An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks[J]. Journal of Parallel Distributed Computing, 2018,111:1-12. |
[21] | 晁昭昭. 基于全同态加密的数据隐私区块链研究[D]. 咸阳:西北农林科技大学, 2019. |
[22] | 朱聪聪. 基于抗泄漏同态加密的智能电网数据聚合协议研究[D]. 南京:南京邮电大学, 2020. |
[23] | LEE J, BYUN H, LIM H. Dual-load bloom filter: Application for name lookup[J]. Computer Communications, 2020,151:1-9. |
[24] | SINGH A, GARG S, KAUR R, et al. Probabilistic data structures for big data analytics: A comprehensive review[J]. Knowledge-Based Systems, 2020,188:104987. |
[25] | 周继平,陈虹,叶正茂. 基于区块链技术的学分银行构建[J]. 中国职业技术教育, 2019(18):51-58. |
[26] | 袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4):481-494. |
[27] | 邵奇峰,金澈清,张召,等. 区块链技术:架构及进展[J]. 计算机学报, 2018,41(5):969-88. |
[28] | 何蒲,于戈,张岩峰,等. 区块链技术与应用前瞻综述[J]. 计算机科学, 2017,44(4):1-7. |
[29] | 梅颖. 基于区块链的物联网访问控制简化模型构建[J]. 中国传媒大学学报(自然科学版), 2017,24(5):7-12. |
[30] | 汪普庆,瞿翔,熊航,等. 区块链技术在食品安全管理中的应用研究[J]. 农业技术经济, 2019(9):82-90. |
[1] | HAN Kun, WANG Zheng, DUAN Jun-yong, YANG Hua-lin. Overview of Data Processing Techniques for MIoT Based on Fog Computing [J]. Computer and Modernization, 2024, 0(01): 13-20. |
[2] | CHAI Li, WANG Xiao, GONG Jia-hao, WANG Yang, JI Shun-hui, ZHANG Peng-cheng. Survey of Supply Chain Oriented Consensus Algorithms [J]. Computer and Modernization, 2023, 0(11): 22-27. |
[3] | HE Yu-peng, TAO Yong, WANG Bing-heng, ZHAO Ying-nan. Research Status and Prospect of Edge Computing in Smart Distribution Network [J]. Computer and Modernization, 2023, 0(08): 87-92. |
[4] | YANG Bo, XU Sheng-chao. Security Protection Method of Cloud Network Special Line Scenarios Based on SRv6#br# Service Chain [J]. Computer and Modernization, 2023, 0(08): 107-111. |
[5] | LYU Zhi-xing, YU Hui, KANG Kai, LI Teng-chang, DU Guo-li. A Feature Modeling Based Bidding Trading Mechanism in Power Blockchain [J]. Computer and Modernization, 2023, 0(08): 112-118. |
[6] | ZHONG Lin-feng, LI Yan-feng, ZHANG Gui-peng, LIU Wen-yin. Decentralized Online Shopping Data Sharing Scheme Based on Blockchain [J]. Computer and Modernization, 2023, 0(07): 61-68. |
[7] | ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen. Survey on Blockchain Security Protection [J]. Computer and Modernization, 2023, 0(06): 110-117. |
[8] | JIANG Yu-hang, ZHANG Xin-you. Ethereum-based Medical Healthy Data Sharing System [J]. Computer and Modernization, 2023, 0(02): 110-115. |
[9] | FENG Yun-xia, CHEN Hong-da, NIU Yun-he. A Relay-based Consortium Chain Cross-chain Communication System [J]. Computer and Modernization, 2023, 0(02): 121-126. |
[10] | DING Zhong-lin, LI Yang, CAO Wei, TAN Yu-hao, XU Bo. Deep Q-learning Based Task Offloading in Power IoT [J]. Computer and Modernization, 2022, 0(11): 75-80. |
[11] | ZHANG Bin, LI Da-peng, JIANG Rui, WANG Xiao-ming. An Off-chain Extended Storage Scheme for Blockchain Traceability [J]. Computer and Modernization, 2022, 0(10): 106-112. |
[12] | FENG Li-gang, ZHU You-wen, . Utility-optimized Local Differential Privacy Mechanism for Protecting Location Privacy [J]. Computer and Modernization, 2022, 0(09): 99-105. |
[13] | SHAN Chao, ZOU Yun-feng. Source Traceability Method for Power Consumption Data Leakage Based on Watermark and Attribute Screening [J]. Computer and Modernization, 2022, 0(03): 37-42. |
[14] | ZHANG Tian-xi, WANG Li-peng, FU Jun-jun, CUI Ci, JIN Meng-lu. Certificateless Signcryption Scheme Based on Blockchain [J]. Computer and Modernization, 2022, 0(01): 120-126. |
[15] | WU Jian-bo, ZHU Wen-xia, JU Liang, XU Zhi-fang. Application of Edge Computing in Intelligent Transportation Systems [J]. Computer and Modernization, 2021, 0(12): 103-109. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||