[1] Kaplan R E. Computer forensics-what is it good for?[J]. Journal of Digital Forensic Practice, 2008, 2(2):57-61.
[2] 何晓行, 王剑虹. 云计算环境下的取证问题研究[J]. 计算机科学, 2012(9):105-108. He Xiaoxing, Wang Jianhong. Research on evidence collection under cloud computing environment[J]. Computer Science, 2012(9):105-108.
[3] Zawoad S, Dutta A K, Hasan R. SecLaaS:secure logging-as-a-service for cloud forensics[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Hangzhou:ACM, 2013:219-230.
[4] 谢亚龙, 丁丽萍, 林渝淇, 等. ICFF:一种IaaS模式下的云取证框架[J]. 通信学报, 2013, 34(5):200-206. Xie Yalong, Ding Liping, Lin Yuqi, et al. ICFF:a cloud forensics framework under the IaaS model[J]. Journal on Communications, 2013, 34(5):200-206.
[5] Sang T. A log based approach to make digital forensics easier on cloud computing[C]//Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on. Hong Kong:IEEE, 2013:91-94.
[6] Hale J S. Amazon cloud drive forensic analysis[J]. Digital Investigation, 2013, 10(3):259-265.
[7] Shah J J, Malik L G. An approach towards digital forensic framework for cloud[C]//Advance Computing Conference (IACC), 2014 IEEE International. Gurgaon:IEEE, 2014:798-801.
[8] Nanda S, Hansen R A. Forensics as a service:three-tier architecture for cloud based forensic analysis[C]//Parallel and Distributed Computing (ISPDC), 201615th International Symposium on. Fuzhou:IEEE, 2016:178-183.
[9] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2009:1-9.
[10] Merkle R C. A certified digital signature[C]//Conference on the Theory and Application of Cryptology. Springer, New York:[s.n.], 1989:218-238.
[11] Lamport L, Shostak R, Pease M. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems (TOPLAS), 1982, 4(3):382-401.
[12] Fischer M J. The consensus problem in unreliable distributed systems (a brief survey)[C]//International Conference on Fundamentals of Computation Theory.[S.l.]:Springer Berlin Heidelberg, 1983:127-140.
[13] Chandra T D, Toueg S. Unreliable failure detectors for reliable distributed systems[J]. Journal of the ACM (JACM), 1996, 43(2):225-267.
[14] Castro M, Liskov B. Practical Byzantine fault tolerance[C]//Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. New Orleans:[s.n.], 1999:173-186.
[15] 张铮文. 一种用于区块链的拜占庭容错算法[EB/OL]. 2016[2017-03-11]. http://docs.neo.org/zh-cn/node/consensus/whitepaper.html.
[16] Karame G. On the security and scalability of Bitcoin's blockchain[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna:ACM, 2016:1861-1862. |