This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Tounsi W, Rais H. A survey on technical threat intelligence in the age of sophisticated cyber-attacks [J]. Computers & Security, 2017: S0167404817301839.TounsiWRaisHA survey on technical threat intelligence in the age of sophisticated cyber-attacks [J]Computers & Security2017S0167404817301839.Search in Google Scholar
Stojmenovic I, Lin X. Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks [J]. Parallel & Distributed Systems IEEE Transactions on, 2001, 12(10):1023–1032.StojmenovicILinXLoop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks [J]Parallel & Distributed Systems IEEE Transactions on2001121010231032Search in Google Scholar
Freedman M J, Morris R. A peer-to-peer anonymizing network layer. MIT, 2002.FreedmanM JMorrisRA peer-to-peer anonymizing network layerMIT2002Search in Google Scholar
Lu T-B, Fang B-X, Sun Y-Z, et al. A scalable anonymous communication protocol [J]. Computer Engineering and Applications, 2005, 41(7):4.LuT-BFangB-XSunY-ZA scalable anonymous communication protocol [J]Computer Engineering and Applications20054174Search in Google Scholar
Juha P. Provably Secure Covert Communication on Blockchain [J]. Cryptography, 2018, 2(3):18-.JuhaPProvably Secure Covert Communication on Blockchain [J]Cryptography20182318Search in Google Scholar
Song S., Peng W. BLOCCE+: An improved blockchain-based steganographic communication method [J]. Journal of Chongqing University of Technology (Natural Sciences), 2020, 34(09):238–244.SongS.PengW.BLOCCE+: An improved blockchain-based steganographic communication method [J]Journal of Chongqing University of Technology (Natural Sciences)20203409238244Search in Google Scholar
Wang Xueli, Pei Dingyi. Theory and implementation of elliptic and superelliptic curve public key ciphers [M]. Science Press, 2006.WangXueliPeiDingyiTheory and implementation of elliptic and superelliptic curve public key ciphers[M].Science Press2006Search in Google Scholar
Yuan Y, Ni XC, Zeng SH, Wang FY. The development status and outlook of blockchain consensus algorithm [J]. Journal of Automation, 2018, 44(11):2011–2022. doi:10.16383/j.aas.2018.c180268.YuanYNiXCZengSHWangFYThe development status and outlook of blockchain consensus algorithm [J]Journal of Automation201844112011202210.16383/j.aas.2018.c180268Open DOISearch in Google Scholar
Liu Yizhong, Liu Jianwei, Zhang Zongyang, Xu Tongge, Yu Hui. A review of blockchain consensus mechanism research [J]. Journal of Cryptography, 2019, 6(04):395–432. doi:10.13868/j.cnki.jcr.000311.LiuYizhongLiuJianweiZhangZongyangXuTonggeYuHuiA review of blockchain consensus mechanism research [J]Journal of Cryptography201960439543210.13868/j.cnki.jcr.000311Open DOISearch in Google Scholar