References
- Tounsi W, Rais H. A survey on technical threat intelligence in the age of sophisticated cyber-attacks [J]. Computers & Security, 2017: S0167404817301839.
- Stojmenovic I, Lin X. Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks [J]. Parallel & Distributed Systems IEEE Transactions on, 2001, 12(10):1023–1032.
- Freedman M J, Morris R. A peer-to-peer anonymizing network layer. MIT, 2002.
- Lu T-B, Fang B-X, Sun Y-Z, et al. A scalable anonymous communication protocol [J]. Computer Engineering and Applications, 2005, 41(7):4.
- Juha P. Provably Secure Covert Communication on Blockchain [J]. Cryptography, 2018, 2(3):18-.
- Song S., Peng W. BLOCCE+: An improved blockchain-based steganographic communication method [J]. Journal of Chongqing University of Technology (Natural Sciences), 2020, 34(09):238–244.
- Wang Xueli, Pei Dingyi. Theory and implementation of elliptic and superelliptic curve public key ciphers [M]. Science Press, 2006.
- Yuan Y, Ni XC, Zeng SH, Wang FY. The development status and outlook of blockchain consensus algorithm [J]. Journal of Automation, 2018, 44(11):2011–2022. doi:10.16383/j.aas.2018.c180268.
- Liu Yizhong, Liu Jianwei, Zhang Zongyang, Xu Tongge, Yu Hui. A review of blockchain consensus mechanism research [J]. Journal of Cryptography, 2019, 6(04):395–432. doi:10.13868/j.cnki.jcr.000311.