[1] |
ALAM M R, REAZ M B I, ALI M A M. A Review of Smart Homes-Past,Present,and Future[J]. IEEE Transactions on Systems,Man,and Cybernetics:Part C (Applications and Reviews), 2012, 42(6):1190-1203.
doi: 10.1109/TSMCC.2012.2189204
|
[2] |
ZUNGERU A M, GABOITAOLELWE J, DIARRA B, et al. A Secured Smart Home Switching System based on Wireless Communications and Self-Energy Harvesting[EB/OL].[2021-12-20]. DOI: 10.1109/ACCESS.2019.2900305.
doi: 10.1109/ACCESS.2019.2900305
|
[3] |
HANUMANTHAIAH A, ARIUN D, LIVA M L, et al. Integrated Cloud based Smart Home with Automation and Remote Controllability[C/OL].[2021-12-24].DOI: 10.1109/ICCES45898.2019.9002245.
doi: 10.1109/ICCES45898.2019.9002245
|
[4] |
FADHIL J A, OMAR O A, SARHAN Q I. A Survey on the Applications of Smart Home Systems[C/OL].[2021-12-22].DOI: 10.1109/CSASE48920.2020.9142103.
doi: 10.1109/CSASE48920.2020.9142103
|
[5] |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C/OL].[2021-12-25].DOI: 10.1145/1180405.1180418.
doi: 10.1145/1180405.1180418
|
[6] |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-Policy Attribute- Based Encryption[C]// Proceedings of IEEE Symposium Security Privacy.Piscataway:IEEE, 2007:321-334.
|
[7] |
LEWKO A, WATERS B. Decentralizing Attribute-Based Encryption[C]// Advances in Cryptology (Lecture Notes in Computer Science):vol.6632.Heidelberg:Springer-Verlag, 2011:568-588.
|
[8] |
HAN J, SUSILO W, MU Y, et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):665-678.
|
[9] |
JEMEL M, SERHROUCHNI A. Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain[C]// 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).Piscataway:IEEE, 2017:177-182.
|
[10] |
GAO S, PIAO G, ZHU J, et al. TrustAccess:A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme based on Blockchain[J]. IEEE Transactions on Vehicular Technology, 2020(99):1.
|
[11] |
邱云翔, 张红霞, 曹琪, 等. 基于CP-ABE算法的区块链数据访问控制方案[J]. 网络与信息安全学报, 2020, 6(3):88-98.
|
|
QIU Yunxiang, ZHANG Hongxia, CAO Qi, et al. Blockchain Data Access Control Scheme based on CP-ABE Algorithm[J]. Chinese Journal of Network and Information Security, 2020, 6(3):88-98.
|
[12] |
FAN K, PAN Q, ZHANG K, et al. A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6):5826-5835.
doi: 10.1109/TVT.2020.2968094
|
[13] |
牛淑芬, 杨平平, 谢亚亚, 等. 区块链上基于云辅助的密文策略属性基数据共享加密方案[J]. 电子与信息学报, 2021, 43(7):1864-1871.
|
|
NIU Shufen, YANG Pingping, XIE Yaya, et al. Cloud-Assisted Ciphertext Policy Attribute Based Encryption Data Sharing Encryption Scheme based on Block Chain[J]. Journal of Electronics & Information Technology, 2021, 43(7):1864-1871.
|
[14] |
尚松超, 陈勃翰, 颜光伟, 等. 基于区块链的数据共享访问控制模型[J]. 通信技术, 2021, 54(12):2666-2673.
|
|
SHANG Songchao, CHEN Bohan, YAN Guangwei, et al. Model for Data Sharing and Access Control based on Bolocechain[J]. Communications Technology, 2021, 54(12):2666-2673.
|
[15] |
DAN B, FRANKLIN M. Identity-Based Encryption from the Weil Pairing[C]// Proceedings of Advances Cryptology.Heidelberg:Springer, 2001:213-229.
|
[16] |
GRAMOLI V. From Blockchain Consensus Back to Byzantine Consensus[J]. Future Generation Computer Systems, 2020, 107:760-769.
doi: 10.1016/j.future.2017.09.023
|
[17] |
GAO S, YU T, ZHU J, et al. T-PBFT:An Eigentrust-Based Practical Byzantine Fault Tolerance Consensus Algorithm[J]. China Communications, 2019, 16(12):111-123.
doi: 10.23919/JCC.2019.12.008
|