[1] SHI W S, CAO J, ZHANG Q, et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5):637-646. [2] KAO Y H, KRISHNAMACHARI B, RA M R, et al. Hermes:latency optimal task assignment for resource-constrained mobile computing[J]. IEEE Transactions on Mobile Computing, 2017, 16(11):3056-3069. [3] REN J K, YU G D, HE Y H, et al. Collaborative cloud and edge computing for latency minimization[J]. IEEE Transactions on Vehicular Technology, 2019, 68(5):5031-5044. [4] 王汝言, 梁颖杰, 崔亚平. 车辆网络多平台卸载智能资源分配算法[J]. 电子与信息学报, 2020, 42(1):263-270.(WANG R Y, LIANG Y J, CUI Y P. Intelligent resource allocation algorithm for multi-platform offloading in vehicle networks[J]. Journal of Electronics and Information Technology, 2020, 42(1):263-270.) [5] ZHAO J H, LI Q P, GONG Y, et al. Computation offloading and resource allocation for cloud assisted mobile edge computing in vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2019, 68(8):7944-7956. [6] ZHANG X H, WANG D. Adaptive traffic signal control mechanism for intelligent transportation based on a consortium blockchain[J]. IEEE Access, 2019, 7:97281-97295. [7] SONG F, HUANG D C, ZHOU H C, et al. An optimization-based scheme for efficient virtual machine placement[J]. International Journal of Parallel Programming, 2014, 42(5):853-872. [8] 施巍松, 孙辉, 曹杰, 等. 边缘计算:万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5):907-924.(SHI W S, SUN H, CAO J, et al. Edge computing-an emerging computing model for the internet of everything era[J]. Journal of Computer Research and Development, 2017, 54(5):907-924.) [9] 施巍松, 张星洲, 王一帆, 等. 边缘计算:现状与展望[J]. 计算机研究与发展, 2019, 56(1):69-89.(SHI W S, ZHANG X Z, WANG Y F, et al. Edge computing:state-of-the-art and future directions[J]. Journal of Computer Research and Development, 2019, 56(1):69-89.) [10] AL-BASSAM M. SCPKI:a smart contract-based PKI and identity system[C]//Proceedings of the 2017 ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York:ACM, 2017:35-40. [11] LU Z J, LIU W C, WANG Q, et al. A privacy-preserving trust model based on blockchain for VANETs[J]. IEEE Access, 2018, 6:45655-45664. [12] CASTRO M, LISKOV B. Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002, 20(4):398-461. [13] 李俊清, 辛衍森, 宋长青, 等. 基于信誉的动态授权PBFT共识机制[J]. 软件, 2019, 40(5):1-7.(LI J Q, XIN Y S, SONG C Q, et al. Reputation-based dynamic authorization PBFT consensus mechanism[J]. Computer Engineering and Software, 2019, 40(5):1-7.) [14] CUI H, MU Y, AU M H. Signcryption secure against linear related-key attacks[J]. The Computer Journal, 2014, 57(10):1472-1483. [15] 李佩丽, 徐海霞, 马添军, 等. 可更改区块链技术研究[J]. 密码学报, 2018, 5(5):501-509.(LI P L, XU H X, MA T J, et al. Research on fault-correcting blockchain technology[J]. Journal of Cryptologic Research, 2018, 5(5):501-509.) |