[1] 荆继武,林璟锵,冯登国.PKI技术[M].北京:科学出版社,2008:6. (JING J W, LIN J Q, FENG D G. PKI Technology[M]. Beijing:Science Press, 2008:6.) [2] 关振胜.公钥基础设施PKI及其应用[M].北京:电子工业出版社,2008:14-16. (GUAN Z S. Public Key Infrastructure PKI and Its Application[J]. Beijing:Publishing House of Electronics Industry, 2008:14-16.) [3] 路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. (LU X M, FENG D G. An identity-based authentication model for multi-domain grids[J]. Acta Electronica Sinica, 2006, 34(4):577-582.) [4] BUTLER R, WELCH V, ENGERT D, et al. A national-scale authentication infrastructure[J]. IEEE Computer, 2000, 33(12):60-66. [5] ROUIBAH K, OULD-ALI S. Dynamic data sharing and security in a collaborative product definition management system[J]. Robotics and Computer-Integrated Manufacturing, 2007, 23(2):217-233. [6] MILLÁN G L, PÉREZ M G, PÉREZ G M, et al. PKI-based trust management in inter-domain scenarios[J]. Computers & Security, 2010, 29(2):278-290. [7] 张文芳,王小敏,郭伟,等.基于椭圆曲线密码体制的高效虚拟企业跨域认证方案[J].电子学报,2014,42(6):1095-1102. (ZHANG W F, WANG X M, GUO W, et al. An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem[J]. Acta Electronica Sinica, 2014, 42(6):1095-1102.) [8] 彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. (PENG H X. An identity-based authentication model for multi-domain[J]. Chinese Journal of Computers, 2006, 29(8):1271-1281.) [9] 罗长远,霍士伟,邢洪智.普适环境中基于身份的跨域认证方案[J]. 通信学报,2011,32(9):111-115. (LUO C Y, HUO S W, XING H Z. Identity-based cross-domain authentication scheme in pervasive computing environments[J]. Journal on Communications, 2011, 32(9):111-115.) [10] LI Y, CHEN W, CAI Z, et al. CAKA:a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks[J]. Wireless Networks, 2016, 22(8):2523-2535. [11] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2017-03-22]. http://tmtfree.hd.free.fr/albums/files/TMTisFree/Documents/Economy/Bitcoin.%20A%20Peer-to-Peer%20Electronic%20Cash%20System.pdf. [12] 工信部.中国区块链技术和应用发展白皮书[R]. 北京:工信部,2016:23. (Ministry of Industry and Information Technology. White paper for Chinese blockchain technology and application development[R]. Beijing:Ministry of Industry and Information Technology. White paper, 2016:23.) [13] FROMKNECHT C, VELICANU D, YAKOUBOV S. CertCoin:a namecoin based decentralized authentication system[R/OL]. (2014-05-14)[2017-05-08]. http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf [14] AXON L. Privacy-awareness in blockchain-based PKI, CDT technical paper series 21/15[R/OL].[2017-05-08]. https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b. [15] LEWISON K, CORELLA F. Backing rich credentials with a blockchain PKI[EB/OL].[2017-04-12]. https://pomcor.com/techreports/BlockchainPKI.pdf. [16] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494. (YUAN Y, WANG F Y. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494.) [17] 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487. (CAI W D, YU L, WANG R, et al. Blockchain application development techniques[J]. Journal of Software, 2017, 28(6):1474-1487.) |