1 |
HASHEMI JOO M, NISHIKAWA Y, DANDAPANI K. Cryptocurrency, a successful application of blockchain technology[J]. Managerial Finance, 2020, 46(6): 715-733.
|
2 |
SCHWIDEROWSKI J, PEDERSEN A B, BECK R. Crypto tokens and token systems[J]. Information Systems Frontiers, 2024, 26(1): 319-332.
|
3 |
LOHACHAB A, GARG S, KANG B, et al. Towards interconnected blockchains: a comprehensive review of the role of interoperability among disparate blockchains[J]. ACM Computing Surveys, 2022, 54(7): No.135.
|
4 |
DAS D, BANERJEE S, CHATTERJEE P, et al. Blockchain for intelligent transportation systems: applications, challenges, and opportunities[J]. IEEE Internet of Things Journal, 2023, 10(21): 18961-18970.
|
5 |
毕红亮,陈艳姣,伊心静,等. 基于博弈的加密货币交易市场用户决策优化分析[J]. 软件学报, 2023, 34(12):5477-5500.
|
|
BI H L, CHEN Y J, YI X J, et al. Game-based optimization analysis of cryptocurrency trading market[J]. Journal of Software, 2023, 34(12): 5477-5500.
|
6 |
蔡维德,王荣,何娟,等. 分布式数字资产交易平台的问题与评估[J]. 软件学报, 2022, 33(2):410-433.
|
|
TSAI W T, WANG R, HE J, et al. Decentralized digital asset exchanges: issues and evaluation[J]. Journal of Software, 2022, 33(2):410-433.
|
7 |
CAI J, ZHOU Y, HU T, et al. PTLC: protect the identity privacy during cross-chain asset transaction more effectively[C]// Proceedings of the IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion. Piscataway: IEEE, 2022: 70-78.
|
8 |
HARISH A R, LIU X L, LI M, et al. Blockchain-enabled digital assets tokenization for cyber-physical traceability in E-commerce logistics financing[J]. Computers in Industry, 2023, 150: No.103956.
|
9 |
Beosin. Q3 2022 global blockchain ecological security report[R]. HongKong: Beosin, 2022.
|
10 |
Analytica Oxford. Poly Network attack underlines growing DeFi risks[EB/OL]. [2023-11-10]..
|
11 |
DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654.
|
12 |
LU S, PEI J, ZHAO R, et al. CCIO: a cross-chain interoperability approach for consortium blockchains based on oracle[J]. Sensors, 2023, 23(4): No.1864.
|
13 |
WU T Y, LEE Z, YANG L, et al. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks[J]. The Journal of Supercomputing, 2021, 77: 6992-7020.
|
14 |
JIANG J, ZHANG Y, ZHU Y, et al. DCIV: decentralized cross-chain data integrity verification with blockchain[J]. Journal of King Saud University — Computer and Information Sciences, 2022, 34(10 Pt A): 7988-7999.
|
15 |
MA Z, WANG J, GAI K, et al. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network[J]. Journal of Systems Architecture, 2023, 134: No.102782.
|
16 |
孙国梓,万明发,王钰,等. 区块链交易隐私保护技术研究进展[J]. 南京邮电大学学报(自然科学版), 2024, 44(4):30-43.
|
|
SUN G Z, WAN M F, WANG Y, et al. A survey on privacy protection technology for blockchain transactions[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2024, 44(4):30-43.
|
17 |
BAGHBANIJAM S, SANAEI H, FARAJZADEH M. An improved authentication & key exchange protocol based on ECDH for WSNs[C]// Proceedings of the 30th International Conference on Electrical Engineering. Piscataway: IEEE, 2022: 563-569.
|
18 |
XIONG A, LIU G, ZHU Q, et al. A notary group-based cross-chain mechanism[J]. Digital Communications and Networks, 2022, 8(6): 1059-1067.
|
19 |
YIN Z, ZHANG B, XU J, et al. Bool Network: an open, distributed, secure cross-chain notary platform[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 3465-3478.
|
20 |
YI H. A post-quantum blockchain notary scheme for cross-blockchain exchange[J]. Computers and Electrical Engineering, 2023, 110: No.108832.
|
21 |
REN Y, LV Z, XIONG N N, et al. HCNCT: a cross-chain interaction scheme for the blockchain-based Metaverse[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7): No.188.
|
22 |
BENSEBA K. Permutation polynomials over finite fields and their application to cryptography[D/OL]. [2024-01-10]..
|
23 |
韦鹏程,杨华千,黄思行,等. 混沌伪随机序列及其应用研究[M]. 北京:科学出版社, 2019:111-117.
|
|
WEI P C, YANG H Q, HUANG S X, et al. Research on chaotic pseudo-random sequences and their applications[M]. Beijing: Science Press, 2019: 111-117.
|
24 |
DEVAL V, DWIVEDI V K, DIXIT A, et al. Mobile smart contracts: exploring scalability challenges and consensus mechanisms[J]. IEEE Access, 2024, 12: 34265-34288.
|
25 |
ITALIS O, PIERRE S, QUINTERO A. Privacy-preserving model for biometric-based authentication and key derivation function[J]. Journal of Information Security and Applications, 2023, 78: No.103624.
|
26 |
DUAN L, SUN Y, NI W, et al. Attacks against cross-chain systems and defense approaches: a contemporary survey[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(8): 1647-1667.
|
27 |
YU B, FENG L, ZHU H, et al. MeHLDT: a multielement hash lock data transfer mechanism for on-chain and off-chain[J]. Peer-to-Peer Networking and Applications, 2023, 16(4): 1927-1943.
|
28 |
YUAN H, FEI S, YAN Z. Technologies of blockchain interoperability: a survey[J]. Digital Communications and Networks, 2023(In Press): No.008.
|
29 |
臧文洋,吕进来. 基于门限签名的时间轮换公证人组模型研究[J]. 计算机科学, 2024, 51(8):403-411.
|
|
ZANG W Y, LYU J L. Study on time rotation notary group model based on threshold signature[J]. Computer Science, 2024, 51(8):403-411.
|