期刊文献+
共找到179篇文章
< 1 2 9 >
每页显示 20 50 100
A Review of Blockchain Layered Architecture and Technology Application Research 被引量:2
1
作者 WANG Changjing JIANG Huiwen +3 位作者 ZENG Jingshan YU Min HUANG Qing ZUO Zhengkang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第5期415-428,共14页
The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of applicat... The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of application in the real world.In this paper,according to the function classification,we divide blockchain technology into five layers:the data layer,the network layer,the consensus layer,the contract layer,and the application layer.For each layer,we elaborate on its technical principles and the latest research status.We also provide empirical cases of blockchain application.This paper summarizes the general functional modules of the blockchain to support the rapid implementation of blockchain applications.In the end,we investigate the challenges faced by blockchain technology and present the research prospects. 展开更多
关键词 blockchain architecture consensus algorithm smart contract cross-chain service blockchain application
原文传递
Deep reinforcement learning based multi-level dynamic reconfiguration for urban distribution network:a cloud-edge collaboration architecture 被引量:1
2
作者 Siyuan Jiang Hongjun Gao +2 位作者 Xiaohui Wang Junyong Liu Kunyu Zuo 《Global Energy Interconnection》 EI CAS CSCD 2023年第1期1-14,共14页
With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provi... With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provides reliable support for reconfiguration optimization in urban distribution networks.Thus,this study proposed a deep reinforcement learning based multi-level dynamic reconfiguration method for urban distribution networks in a cloud-edge collaboration architecture to obtain a real-time optimal multi-level dynamic reconfiguration solution.First,the multi-level dynamic reconfiguration method was discussed,which included feeder-,transformer-,and substation-levels.Subsequently,the multi-agent system was combined with the cloud-edge collaboration architecture to build a deep reinforcement learning model for multi-level dynamic reconfiguration in an urban distribution network.The cloud-edge collaboration architecture can effectively support the multi-agent system to conduct“centralized training and decentralized execution”operation modes and improve the learning efficiency of the model.Thereafter,for a multi-agent system,this study adopted a combination of offline and online learning to endow the model with the ability to realize automatic optimization and updation of the strategy.In the offline learning phase,a Q-learning-based multi-agent conservative Q-learning(MACQL)algorithm was proposed to stabilize the learning results and reduce the risk of the next online learning phase.In the online learning phase,a multi-agent deep deterministic policy gradient(MADDPG)algorithm based on policy gradients was proposed to explore the action space and update the experience pool.Finally,the effectiveness of the proposed method was verified through a simulation analysis of a real-world 445-node system. 展开更多
关键词 Cloud-edge collaboration architecture Multi-agent deep reinforcement learning multi-level dynamic reconfiguration Offline learning Online learning
在线阅读 下载PDF
EGSNet:An Efficient Glass Segmentation Network Based on Multi-Level Heterogeneous Architecture and Boundary Awareness
3
作者 Guojun Chen Tao Cui +1 位作者 Yongjie Hou Huihui Li 《Computers, Materials & Continua》 SCIE EI 2024年第12期3969-3987,共19页
Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-see... Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-seeking real-time tasks such as autonomous driving.The inefficiency of the models is mainly due to employing homogeneous modules to process features of different layers.These modules require computationally intensive convolutions and weight calculation branches with numerous parameters to accommodate the differences in information across layers.We propose an efficient glass segmentation network(EGSNet)based on multi-level heterogeneous architecture and boundary awareness to balance the model performance and efficiency.EGSNet divides the feature layers from different stages into low-level understanding,semantic-level understanding,and global understanding with boundary guidance.Based on the information differences among the different layers,we further propose the multi-angle collaborative enhancement(MCE)module,which extracts the detailed information from shallow features,and the large-scale contextual feature extraction(LCFE)module to understand semantic logic through deep features.The models are trained and evaluated on the glass segmentation datasets HSO(Home-Scene-Oriented)and Trans10k-stuff,respectively,and EGSNet achieves the best efficiency and performance compared to advanced methods.In the HSO test set results,the IoU,Fβ,MAE(Mean Absolute Error),and BER(Balance Error Rate)of EGSNet are 0.804,0.847,0.084,and 0.085,and the GFLOPs(Giga Floating Point Operations Per Second)are only 27.15.Experimental results show that EGSNet significantly improves the efficiency of the glass segmentation task with better performance. 展开更多
关键词 Image segmentation multi-level heterogeneous architecture feature differences
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
4
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts architecture Security Vulnerability Web Applications blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
在线阅读 下载PDF
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture 被引量:5
5
作者 Lei Meng Daochao Huang +2 位作者 Jiahang An Xianwei Zhou Fuhong Lin 《China Communications》 SCIE CSCD 2022年第8期198-213,共16页
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of ... Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of the most crucial cornerstones,especially in the IoT scenario.In the zero-trust architecture,trust does not rely on any position,person or device.However,to the best of our knowledge,almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values.This is betrayed by the principle of zero-trust architecture.In this paper,we employ the blockchain to eliminate the trusted node.One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism.Additionally,the devices are categorized into three folds:trusted device,suspected device and untrusted device.Only the first two can participate in authentication,and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency.Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part.Finally,we implement the proposed protocol on simulated devices.The result illustrates that our scheme is highly efficient,and the continuous authentication only costs around 0.1ms. 展开更多
关键词 continuous authentication zero-trust architecture device-to-device blockchain IoT
在线阅读 下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
6
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
在线阅读 下载PDF
ACR-MLM:a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing
7
作者 Saeed Banaeian Far Azadeh Imani Rad Maryam Rajabzadeh Asaar 《Data Science and Management》 2022年第4期219-231,共13页
Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,su... Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,such as user privacy violations,company owner(CO)fraud,the changing of sold products’information,and the scalability of selling networks.This study presents the concept of a blockchain-based market called ACR-MLM that functions based on the multi-level marketing(MLM)model,through which registered users receive anonymous and confidential rewards for their own and their subgroups’sales.Applying a public blockchain as the ACR-MLM framework’s infrastructure solves existing problems in MLM-based markets,such as CO fraud(against the government or its users),user privacy violations(obtaining their real names or subgroup users),and scalability(when vast numbers of users have been registered).To provide confidentiality and scalability to the ACR-MLM framework,hierarchical identity-based encryption(HIBE)was applied with a functional encryption(FE)scheme.Finally,the security of ACR-MLM is analyzed using the random oracle(RO)model and then evaluated. 展开更多
关键词 Anonymous rewarding blockchain Functional encryption multi-level marketing PRIVACY
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
8
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
基于区块链技术的天地一体化信息网络架构设计
9
作者 安中文 陈拓 +2 位作者 唐小华 邓啸 张华健 《航天器工程》 北大核心 2026年第1期37-44,共8页
针对天地一体化信息网络架构中存在网络间的信息传输时延大、网络资源分配效率和可靠性不高的问题,文章设计了一种基于区块链技术的天地一体去中心化网络架构。采用将区块链去中心化、分布式及智能合约技术相结合的方法,提出了一种新的... 针对天地一体化信息网络架构中存在网络间的信息传输时延大、网络资源分配效率和可靠性不高的问题,文章设计了一种基于区块链技术的天地一体去中心化网络架构。采用将区块链去中心化、分布式及智能合约技术相结合的方法,提出了一种新的去中心化网络架构,并通过将边缘节点部署于区块链的私有链及联盟链,构建了该架构下的网络信息系统模型和信息处理机制。经网络性能分析,此设计架构相比传统架构可以降低网络时延,实现更高的网络资源分配效率和系统可靠性。 展开更多
关键词 区块链技术 天地一体化网络 去中心化架构 卫星通信
在线阅读 下载PDF
基于区块链的新能源数据平台架构技术研究
10
作者 孟亮东 董亮 +2 位作者 李惟一 张永锋 韦将 《粘接》 2026年第3期822-825,共4页
为进一步提高新能源数据平台安全,加强数据平台完整性的验证,以确定数据是否被篡改或损坏。基于此,提出区块链的数据完整性检测技术,以保护新能源数据平台中的数据完整性。首先架构区块链算法,设定数据平台指示数据块,其次将新能源数据... 为进一步提高新能源数据平台安全,加强数据平台完整性的验证,以确定数据是否被篡改或损坏。基于此,提出区块链的数据完整性检测技术,以保护新能源数据平台中的数据完整性。首先架构区块链算法,设定数据平台指示数据块,其次将新能源数据块的索引嵌入到其数据完整性验证标记的计算中。实验结果表明,当数据块的数量为600时,区块链时间开销约为6.3 ms,区块链算法可以在极短时间内检测新能源数据平台中的数据完整性,且时间开销较随机森林算法平均提高24.5%。同时基于所架构的区块链算法,最大不完整性数据检测率为99.6%,可满足实际新能源平台数据完整性检测要求。且区块链数据块较大时,所需的时间较短,因此建议区块链数据块大于1024 kB。 展开更多
关键词 区块链 新能源数据 架构技术 数据块
在线阅读 下载PDF
Integration of Communication and Computing in Blockchain-Enabled Multi-Access Edge Computing Systems 被引量:2
11
作者 Zhonghua Zhang Jie Feng +2 位作者 Qingqi Pei Le Wang Lichuan Ma 《China Communications》 SCIE CSCD 2021年第12期297-314,共18页
Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and managemen... Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and management mechanism,blockchain technology achieves the reliable transmis-sion of data and value.While as a new computing paradigm,multi-access edge computing enables the high-frequency interaction and real-time transmission of data.The integration of communication and com-puting in blockchain-enabled multi-access edge com-puting networks has been studied without a systemat-ical view.In the survey,we focus on the integration of communication and computing,explores the mu-tual empowerment and mutual promotion effects be-tween the blockchain and MEC,and introduces the resource integration architecture of blockchain and multi-access edge computing.Then,the paper sum-marizes the applications of the resource integration ar-chitecture,resource management,data sharing,incen-tive mechanism,and consensus mechanism,and ana-lyzes corresponding applications in real-world scenar-ios.Finally,future challenges and potentially promis-ing research directions are discussed and present in de-tail. 展开更多
关键词 blockchain multi-access edge computing mutual empowerment network architecture
在线阅读 下载PDF
Capability-based IoT access control using blockchain 被引量:2
12
作者 Yue Liu Qinghua Lu +4 位作者 Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期463-469,共7页
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and cities.However,the existing IoT access control solutions are mainly based on conventi... Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and cities.However,the existing IoT access control solutions are mainly based on conventional identity management schemes and use centralized architectures.There are knowm security and privacy limitations with such schemes and architectures,such as the single-point failure or surveillance(e.g.,device tracking).Hence,in this paper,we present an architecture for capability-based IoT access control utilizing the blockchain and decentralized identifiers to manage the identity and access control for IoT devices.Then,we propose a protocol to provide a systematic view of system interactions,to improve security.We also implement a proof-of-concept prototype of the proposed approach and evaluate the prototype using a real-world use case.Our evaluation results show that the proposed solution is feasible,secure,and scalable. 展开更多
关键词 blockchain Internet of things Capability-based access control Identity management architecture design
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
13
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
融合区块链技术的高校机构知识库架构体系 被引量:1
14
作者 曾云华 杨顺 郭韫丽 《河北科技图苑》 2025年第4期91-96,36,共7页
鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服... 鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服务四个模块。 展开更多
关键词 区块链 高校 机构知识库 架构体系
在线阅读 下载PDF
基于区块链技术的电池供应链溯源与质量管控
15
作者 陈建鑫 刘利民 《电池》 北大核心 2025年第6期1383-1386,共4页
当前,电池供应链存在结构复杂、环节众多、全球化程度高等特点,传统溯源与质量管控方式面临信息不透明、数据易篡改、质量追溯困难及监管难度大等问题。区块链技术凭借去中心化、数据不可篡改、可追溯等特性,为解决这些问题提供了途径... 当前,电池供应链存在结构复杂、环节众多、全球化程度高等特点,传统溯源与质量管控方式面临信息不透明、数据易篡改、质量追溯困难及监管难度大等问题。区块链技术凭借去中心化、数据不可篡改、可追溯等特性,为解决这些问题提供了途径。探讨区块链技术在电池供应链中的应用,设计了溯源与质量管控模式,并分析了相关挑战与对策,旨在为电池供应链的优化与升级提供理论支持与实践参考。 展开更多
关键词 区块链技术 电池供应链 架构设计 溯源 质量管控
在线阅读 下载PDF
轻量级区块链架构在农产品供应链溯源中的应用研究——以香蕉供应链为例
16
作者 王仕勋 《黄冈职业技术学院学报》 2025年第6期77-83,共7页
为解决农产品溯源中数据可信、系统性能与扩展性难以兼顾的难题,本研究设计了一种轻量级分层区块链架构。该架构结合可验证随机函数(VRF)与多维动态权重机制,在保障安全性的同时,实现了处理性能与系统扩展性之间的平衡;并在改进的拜占... 为解决农产品溯源中数据可信、系统性能与扩展性难以兼顾的难题,本研究设计了一种轻量级分层区块链架构。该架构结合可验证随机函数(VRF)与多维动态权重机制,在保障安全性的同时,实现了处理性能与系统扩展性之间的平衡;并在改进的拜占庭容错(BFT)协议中引入基于VRF的领导者选举机制,并优化两阶段提交流程,有效降低了通信开销。以“热带金蕉”供应链为案例的仿真实验表明:与采用BFT共识的Fabric-IBFT相比,本架构的平均交易时延从620 ms降至295 ms,降幅达52.4%;系统饱和吞吐量提升至1105 tps,约为Fabric-IBFT(280 tps)的3.95倍;异常事件的链上响应与全局同步时间可控制在3分钟以内。研究表明,所提架构在保持BFT级别安全的前提下,其性能显著优于同类BFT共识方案,为农产品溯源提供了一种高效可行的技术路径。 展开更多
关键词 区块链 农产品溯源 轻量级架构 供应链 共识机制
在线阅读 下载PDF
移动边缘计算环境下的信任评估技术综述 被引量:2
17
作者 朱雨润 任爽 《计算机应用研究》 北大核心 2025年第5期1281-1289,共9页
随着物联网设备规模的增长和5G网络的普及,移动边缘计算成为满足数据处理和计算需求的重要技术。为保障系统的安全性和可靠性,信任评估技术在该领域的应用日益受到关注。为此,系统梳理了移动边缘计算中的信任评估技术,主要任务包括总结... 随着物联网设备规模的增长和5G网络的普及,移动边缘计算成为满足数据处理和计算需求的重要技术。为保障系统的安全性和可靠性,信任评估技术在该领域的应用日益受到关注。为此,系统梳理了移动边缘计算中的信任评估技术,主要任务包括总结现有信任评估方法,回顾最新研究进展,重点探讨区块链技术和零信任架构在信任评估中的应用,主题范围涵盖信任评估技术的应用场景、当前挑战及未来发展方向等。 展开更多
关键词 移动边缘计算 信任评估 区块链 零信任架构
在线阅读 下载PDF
6G网络安全的架构与关键技术 被引量:1
18
作者 罗涵一 崔宝江 仝鑫 《中兴通讯技术》 北大核心 2025年第3期50-55,共6页
6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编... 6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编排等关键技术的应用,为构建面向未来的安全、可信的6G网络提供理论参考。 展开更多
关键词 6G网络 安全架构 量子通信 区块链
在线阅读 下载PDF
基于默克尔树结构的多链溯源技术 被引量:1
19
作者 周子愚 陈珊珊 《计算机工程与设计》 北大核心 2025年第5期1327-1334,共8页
针对供应链溯源中存储成本高、隐私易泄露、交易速度慢等问题,基于默克尔树搭建多链架构,设计智能合约实现数据查询、精准监管等功能,通过IPFS优化数据流;运用CBC-SM2算法保护企业隐私,将CBC模式与区块链结合降低密钥管理难度,减少上链... 针对供应链溯源中存储成本高、隐私易泄露、交易速度慢等问题,基于默克尔树搭建多链架构,设计智能合约实现数据查询、精准监管等功能,通过IPFS优化数据流;运用CBC-SM2算法保护企业隐私,将CBC模式与区块链结合降低密钥管理难度,减少上链成本;引入信誉机制改进Raft共识,根据信誉值设置L标志位减少无效竞选。实验结果表明,该方案降低约27%存储成本,查询效率提高,较其它方案仅单次查询即可完成溯源数据验伪;混合加密的效率提升40.4%,降低了通信开销;企业链共识效率提升6.57%,提高了供应链交易速率。 展开更多
关键词 区块链 智能合约 溯源 默克尔树 多链架构 隐私保护 Raft共识
在线阅读 下载PDF
基于区块链技术的药品供应保障系统:MedChain 被引量:1
20
作者 廖俊 曹术兰 +5 位作者 吕文轩 刘东平 蔡鸿斌 葛卫红 刘慧 梁红云 《药学与临床研究》 2025年第1期93-96,共4页
基于超级账本(HyperledgerFabric)区块链架构,采用Vue、Element以及Axios技术构建医疗保障供应系统(MedChain),借助江苏药品供应链数据对MedChain系统进行测试,并从安全性、效率和监管三个方面对系统性能进行了评估,结果显示MedChain系... 基于超级账本(HyperledgerFabric)区块链架构,采用Vue、Element以及Axios技术构建医疗保障供应系统(MedChain),借助江苏药品供应链数据对MedChain系统进行测试,并从安全性、效率和监管三个方面对系统性能进行了评估,结果显示MedChain系统能够在满足《药品经营质量管理规范》的前提下,提高药品从供应商到医疗机构以及医疗机构到医疗机构的流通效率,从而解决应急情况下的医疗机构药品短缺问题。 展开更多
关键词 药品供应 区块链 Hyperledger Fabric架构 药品可追溯 药品质量管理规范
暂未订购
上一页 1 2 9 下一页 到第
使用帮助 返回顶部