[1] |
中国信息通信研究院. 数据要素白皮书(2022年)[R], 2023.
|
[2] |
复旦大学数字与移动治理实验室. 中国地方公共数据开放利用报告:城市(2023年度)[R], 2023.
|
[3] |
AWS. AWS data exchange[DB/OL]. 2024[2024-02-01]. https://aws.amazon.com/cn/data-exchange.
|
[4] |
工业互联网产业联盟, 中国信息通信研究院. 可信工业数据空间系统架构1.0[R], 2022.
|
[5] |
LIM S Y, FOTSING P T, ALMASRI A, et al. Blockchain technology the identity management and authentication service disruptor: a survey[J]. International Journal on Advanced Science, Engineering and Information Technology, 2018, 8(4-2):1735-1745.
doi: 10.18517/ijaseit.8.4-2.6838
URL
|
[6] |
杨雪菲. 数字签名技术综述[J]. 电脑编程技巧与维护, 2021(11):7-9.
|
[7] |
LIU Y, HE D, OBAIDAT M S, et al. Blockchain-based identity management systems: a review[J]. Journal of Network and Computer Applications, 2020, 166:102731.
doi: 10.1016/j.jnca.2020.102731
URL
|
[8] |
王卓, 刘国伟, 王岩, 等. 数据脱敏技术发展现状及趋势研究[J]. 信息通信技术与政策, 2020, 46(4): 18-22.
|
[9] |
RANI S, KAUR H. Technical review on symmetric and asymmetric cryptography algorithms[J]. International Journal of Advanced Research in Computer Science, 2017, 8(4):182-186.
|
[10] |
王艳红, 孔玲, 付艳艳, 等. 隐私计算技术标准化路径分析与建议[J]. 信息通信技术与政策, 2024, 50(1): 32-36.
|
[11] |
任洪民, 李祉岐, 孙磊, 等. 隐私计算技术应用和展望[J]. 中国信息化, 2023(12): 66-69.
|
[12] |
CABRERO-HOLGUERAS J, PASTRANA S. SoK: privacy-preserving computation techniques for deep learning[C/OL]// Proceedings on Privacy Enhancing Technologies, 2021(4): 139-162.
|
[13] |
LI Z, SHARMA V, MOHANTY S P. Preserving data privacy via federated learning: challenges and solutions[J]. IEEE Consumer Electronics Magazine, 2020, 9(3):8-16.
|
[14] |
WANG W, JIANG Y, SHEN Q, et al. Toward scalable fully homomorphic encryption through light trusted computing assistance[J]. arXiv Preprint arXiv:1905. 07766, 2019.
|
[15] |
陈山枝, 葛雨明, 时岩. 蜂窝车联网(C-V2X)技术发展、应用及展望[J]. 电信科学, 2022, 38(1): 1-12.
doi: 10.11959/j.issn.1000-0801.2022007
|
[16] |
中国信息通信研究院. 数据要素白皮书(2023年)[R], 2023.
|
[17] |
CASADO R, YOUNAS M. Emerging trends and technologies in big data processing[J]. Concurrency and Computation: Practice and Experience, 2015, 27(8): 2078-2091.
doi: 10.1002/cpe.v27.8
URL
|
[18] |
GIPP B, MEUSCHKE N, GERNANDT A. Decentralized trusted timestamping using the crypto currency bitcoin[J]. arXiv Preprint arXiv:1502.04015, 2015.
|
[19] |
FREIRE J, KOOP D, MOREAU L. Provenance and annotation of data and processes[C/OL]// Second International Provenance and Annotation Workshop. London:Springer, 2008: 17-18.
|
[20] |
明华, 张勇, 符小辉. 数据溯源技术综述[J]. 小型微型计算机系统, 2012, 33(9): 1917-1923.
|
[21] |
戴超凡, 王涛, 张鹏程. 数据起源技术发展研究综述[J]. 计算机应用研究, 2010, 27(9):3215-3221.
|
[22] |
张国英. 基于区块链的数据溯源技术的研究[D]. 南京: 南京邮电大学, 2020.
|
[23] |
Catena-X. Catena-X automotive network e.V. list of members[R], 2023.
|