Page 139 - 《软件学报》2026年第1期
P. 139

136                                                        软件学报  2026  年第  37  卷第  1  期


                      3345649]
                 [116]   Durumeric  Z,  Ma  Z,  Springall  D,  Barnes  R,  Sullivan  N,  Bursztein  E,  Bailey  M,  Halderman  JA,  Paxson  V.  The  security  impact  of
                      HTTPS interception. In: Proc. of the 2017 Network and Distributed System Security (NDSS) Symp. 2017. San Diego, 2017.
                 [117]   Wang  XW,  Zhao  H,  Zhu  JK.  GRPC:  A  communication  cooperation  mechanism  in  distributed  systems.  ACM  SIGOPS  Operating
                      Systems Review, 1993, 27(3): 75–86. [doi: 10.1145/155870.155881]
                 [118]   CMBaaS. 2024 (in Chinese). https://it.10086.cn/services/cmbaas/
                 [119]   Demers A, Greene D, Hauser C, Irish W, Larson J, Shenker S, Sturgis H, Swinehart D, Terry D. Epidemic algorithms for replicated
                      database maintenance. In: Proc. of the 6th Annual ACM Symp. on Principles of Distributed Computing. Vancouver: ACM, 1987. 1–12.
                      [doi: 10.1145/41840.41841]
                 [120]   Wang X, Jiang X, Liu YX, Wang JP, Sun Y. Data propagation for low latency blockchain systems. IEEE Journal on Selected Areas in
                      Communications, 2022, 40(12): 3631–3644. [doi: 10.1109/JSAC.2022.3213330]
                 [121]   Banerjee-Mishra T, Sahni S. PubSub: An efficient publish/subscribe system. IEEE Trans. on Computers, 2015, 64(4): 1119–1132. [doi:
                      10.1109/TC.2014.2315636]
                 [122]   Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S. On the security and performance of proof of work blockchains.
                      In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 3–16. [doi: 10.1145/
                      2976749.2978341]
                 [123]   Kiayias A, Russell A, David B, Oliynykov R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Proc. of the 37th
                      Annual Int’l Cryptology Conf. on Advances in Cryptology. Santa Barbara: Springer, 2017. 357–388. [doi: 10.1007/978-3-319-63688-
                      7_12]
                 [124]   Castro M, Liskov B. Practical Byzantine fault tolerance. In: Proc. of the 3rd Symp. on Operating Systems Design and Implementation.
                      New Orleans: USENIX Association, 1999. 173–186.
                 [125]   Veronese GS, Correia M, Bessani AN, Lung LC, Verissimo P. Efficient Byzantine fault-tolerance. IEEE Trans. on Computers, 2013,
                      62(1): 16–30. [doi: 10.1109/TC.2011.221]
                 [126]   Buchman E. Tendermint: Byzantine fault tolerance in the age of blockchains [MS. Thesis]. Guelph: The University of Guelph, 2016.
                 [127]   Castro  M,  Liskov  B.  Practical  Byzantine  fault  tolerance  and  proactive  recovery.  ACM  Trans.  on  Computer  Systems,  2002,  20(4):
                      398–461. [doi: 10.1145/571637.571640]
                 [128]   Decouchant J, Kozhaya D, Rahli V, Taïani F, Zappa N. DAMYSUS: Streamlined BFT consensus leveraging trusted components. In:
                      Proc. of the 17th European Conf. on Computer Systems (EuroSys 2022). Rennes: ACM, 2022. 1–16. [doi: 10.1145/3492321.3519568]
                 [129]   MAXBFT. The self-developed assembly line consensus algorithm project of Changan Chain 2.0 version. 2024 (in Chinese). https://git.
                      chainmaker.org.cn/chainmaker/consensus-maxbft
                 [130]   Micali S, Rabin M, Vadhan S. Verifiable random functions. In: Proc. of the 40th Annual Symp. on Foundations of Computer Science.
                      New York: IEEE, 1999. 120–130. [doi: 10.1109/SFFCS.1999.814584]
                 [131]   Vyper. Overview. 2024. https://docs.vyperlang.org/en/stable/
                 [132]   WebAssembly. Guides. 2024. https://developer.mozilla.org/en-US/docs/WebAssembly
                 [133]   Docker. Dockerdocs. 2024. https://docs.docker.com/docker-hub/
                 [134]   Kubernetes. Kubernetes documentation. 2024. https://kubernetes.io/docs/home/
                 [135]   Bathula PN, Sreenivasulu M. An integrated blockchain framework for secure data sharing in IoT fog computing. Tsinghua Science and
                      Technology, 2025, 30(3): 957–977. [doi: 10.26599/TST.2024.9010082]
                 [136]   Wang C, Zhang N, Wang C. Managing privacy in the digital economy. Fundamental Research, 2021, 1(5): 543–551. [doi: 10.1016/J.
                      FMRE.2021.08.009]
                 [137]   Lindell Y. Secure multiparty computation. Communications of the ACM, 2020, 64(1): 86–96. [doi: 10.1145/3387108]
                 [138]   Martins P, Sousa L, Mariano A. A survey on fully homomorphic encryption: An engineering perspective. ACM Computing Surveys,
                      2017, 50(6): 83. [doi: 10.1145/3124441]
                 [139]   Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology,
                      2009, 22(1): 114–138. [doi: 10.1007/s00145-007-9011-9]
                 [140]   Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not. In: Proc. of the 2015 IEEE Trustcom/
                      BigDataSE/ISPA. Helsinki: IEEE, 2015. 57–64. [doi: 10.1109/Trustcom.2015.357]
                 [141]   Zamani M, Movahedi M, Raykova M. RapidChain: Scaling blockchain via full sharding. In: Proc. of the 2018 ACM SIGSAC Conf. on
                      Computer and Communications Security. Toronto: ACM, 2018. 931–948. [doi: 10.1145/3243734.3243853]
                 [142]   Xiong A, Zhang W, Song Y, Wang D, Li D, Guo QL, Bai DS. Asynchronous consensus algorithm integrating dynamic weight sharding
   134   135   136   137   138   139   140   141   142   143   144