共 42 条
[11]
(2020)
[12]
Kofahi N.A., Al-Rabadi A.R., Identifying the top threats in cloud computing and its suggested solutions: a survey, Networks, 6, 1, pp. 1-13, (2018)
[13]
(2008)
[14]
Meng W., Tischhauser E., Wang Q., Wang Y., Han J., When intrusion detection meets blockchain technology: a review, IEEE Access, 6, pp. 10179-10188, (2018)
[15]
Lin Q., Yan H., Huang Z., Chen W., Shen J., Tang Y., An id-based linearly homomorphic signature scheme and its application in blockchain, IEEE Access, 6, pp. 20632-20640, (2018)
[16]
Parameswaran M., Susarla A., Whinston A.B., P2P networking: an information sharing alternative, Computer (Long Beach Calif), 34, 7, pp. 31-38, (2001)
[17]
Wang C., Ren K., Wang J., Secure optimization computation outsourcing in cloud computing: a case study of linear programming, IEEE Trans Comput, 65, 1, pp. 216-229, (2016)
[18]
Xu C., Wang K., Guo M., Intelligent resource management in blockchain-based cloud datacenters, IEEE Cloud Computing, 4, 6, pp. 50-59, (2017)
[19]
Park J.H., Park J.H., Blockchain security in cloud computing: use cases, challenges and solutions, Symmetry (Basel), 9, 8, pp. 1-13, (2017)
[20]
Yu G., Wang X., Yu K., Ni W., Zhang J.A., Liu R.P., Survey: sharding in blockchains, IEEE Access, 8, pp. 14155-14181, (2020)