| 1 | 袁驰.基于身份的动态层簇式无线传感网络认证算法[J].计算机应用, 2020, 40(11): 3236-3241.  10.11772/j.issn.1001-9081.2020030400 | 
																													
																						|  | YUAN C. Identity-based dynamic clustering authentication algorithm for wireless sensor networks[J]. Journal of Computer Applications, 2020, 40(11): 3236-3241.  10.11772/j.issn.1001-9081.2020030400 | 
																													
																						| 2 | WANG J, CAO Y Q, LI B, et al. Particle swarm optimization based clustering algorithm with mobile sink for WSNs[J]. Future Generations Computer Systems, 2017, 76: 452-457.  10.1016/j.future.2016.08.004 | 
																													
																						| 3 | BUTTYAN L, GESSNER D, HESSLER A, et al. Application of wireless sensor networks in critical infrastructure protection: challenges and design options [J]. IEEE Wireless Communications, 2010, 17(5): 44-49.  10.1109/mwc.2010.5601957 | 
																													
																						| 4 | 任志玲,张广全,林冬,等.无线传感器网络应用综述[J].传感器与微系统, 2018, 37(3): 1-2, 10. | 
																													
																						|  | REN Z L, ZHANG G Q, LIN D, et al. Review on application of WSNs[J]. Transducer and Microsystem Technologies, 2018, 37(3): 1-2, 10. | 
																													
																						| 5 | 谢英英,石涧,黄硕康,等.面向5G的命名数据网络物联网研究综述[J].计算机科学, 2020, 47(4): 217-225.  10.11896/jsjkx.191000157 | 
																													
																						|  | XIE Y Y, SHI J, HUANG S K, et al. Survey on Internet of Things based on named data networking facing 5G[J]. Computer Science, 2020, 47(4): 217-225.  10.11896/jsjkx.191000157 | 
																													
																						| 6 | MAITI P, SHUKLA J, SAHOO B, et al. Efficient data collection for IoT services in edge computing environment [C]// Proceedings of the 2017 International Conference on Information Technology. Piscataway: IEEE, 2017: 101-106.  10.1109/icit.2017.40 | 
																													
																						| 7 | XIONG J B, CHEN L, BHUIYAN M Z A, et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020, 111: 741-753.  10.1016/j.future.2019.10.017 | 
																													
																						| 8 | 张远方.分层无线传感网络用户认证技术研究[D].南京:东南大学, 2016: 26-35.  10.21629/jsee.2017.01.19 | 
																													
																						|  | ZHANG Y F. Research on user authentication technology in hierarchical wireless sensor network[D]. Nanjing: Southeast University, 2016: 26-35.  10.21629/jsee.2017.01.19 | 
																													
																						| 9 | 王辉,刘玉祥,曹顺湘,等.融入区块链技术的医疗数据存储机制[J].计算机科学, 2020, 47(4): 285-291.  10.11896/jsjkx.190400001 | 
																													
																						|  | WANG H, LIU Y X, CAO S X, et al. Medical data storage mechanism integrating blockchain technology[J]. Computer Science, 2020, 47(4): 285-291.  10.11896/jsjkx.190400001 | 
																													
																						| 10 | KIM T H, GOYAT R, RAI M K, et al. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks[J]. IEEE Access, 2019, 7: 184133-184144.  10.1109/access.2019.2960609 | 
																													
																						| 11 | 周致成,李立新,李作辉.基于区块链技术的高效跨域认证方案[J].计算机应用, 2018, 38(2): 316-320, 326. | 
																													
																						|  | ZHOU Z C, LI L X, LI Z H. Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018, 38(2): 316-320, 326. | 
																													
																						| 12 | 西门子公司.防篡改地建立密钥的方法和系统:中国, 200780014690.4[P]. 2007-05-06.  10.17265/1537-1506/2007.05 | 
																													
																						|  | SIEMENS. Method and system for the manipulation protected generation of a cryptographic key: China, 200780014690.4[P]. 2007-05-06.  10.17265/1537-1506/2007.05 | 
																													
																						| 13 | 付烁,徐海霞,李佩丽,等.数字货币的匿名性研究[J].计算机学报, 2019, 42(5): 1045-1062. | 
																													
																						|  | FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency[J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062. | 
																													
																						| 14 | PUTHAL D, MALIK N, MOHANTY S P, et al. The blockchain as a decentralized security framework [J]. IEEE Consumer Electronics Magazine, 2018, 7(2): 18-21.  10.1109/mce.2017.2776459 | 
																													
																						| 15 | 汪和平.椭圆曲线加密IP核的设计与实现[D].哈尔滨:哈尔滨工业大学, 2012: 19-27. | 
																													
																						|  | WANG H P. Design and implementation of elliptic curve encryption IP core[D]. Harbin: Harbin Institute of Technology, 2012: 19-27. | 
																													
																						| 16 | 赵梁,李磊,李向丽.基于双序列函数的重放攻击防御方案[J].计算机工程, 2020, 46(9): 143-148. | 
																													
																						|  | ZHAO L, LI L, LI X L. Replay attack defense scheme based on double sequence function[J]. Computer Engineering, 2020, 46(9): 143-148. | 
																													
																						| 17 | 陈华,习伟,范丽敏,等.密码产品的侧信道分析与评估[J].电子与信息学报, 2020, 42(8): 1836-1845.  10.11999/JEIT190853 | 
																													
																						|  | CHEN H, XI W, FAN L M, et al. Side channel analysis and evaluation on cryptographic products[J]. Journal of Electronics and Information Technology, 2020, 42(8): 1836-1845.  10.11999/JEIT190853 | 
																													
																						| 18 | BALA S, SHARMA G, VERMA A K. Impersonation attack on CertificateLess key agreement protocol[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2018, 27(2): 108-120.  10.1504/ijahuc.2018.089580 | 
																													
																						| 19 | CHEN X H, MIZERA A, PANG J. Activity tracking: a new attack on location privacy [C]// Proceedings of the 2015 IEEE Conference on Communications and Network Security. Piscataway: IEEE, 2015: 22-30.  10.1109/cns.2015.7346806 |