期刊文献+

浅谈区块链技术及应用价值 被引量:1

A Brief Talk on the Teachnology of BlockChain and its Application Value
下载PDF
导出
摘要 区块链最早是作为数字加密货币中的一项基础核心技术,并在近几年随着比特币的一路高涨而逐渐进入了大众的视野.由于区块链具有去中心化,防篡改等特点受到了越来越多的关注.并且目前区块链的价值已经超过比特币本身,它可以从根本上改变目前的商业模式,生产关系和人类社会现有的信任机制,将会对人类的现有生活造成又一次的巨大颠覆.本文将深入浅出的阐述区块链的产生过程并结合以太坊网络分析区块链的设计和结构,总结说明区块链的相关技术应用.根据现在的市场情况对区块链技术的实际应用场景和未来发展做了简要分析. Blockchain was first used as a basic core technology in digital cryptocurrency,and has gradually come into public view in recent years with the rapid rise of bitcoin.Due to the decentralization of blockchain,tamper-proof and other features have attracted more and more attention.And the current value of blockchain has exceeded bitcoin itself.It can fundamentally change the current business model,production relationship and existing trust mechanism of human society,which will cause another huge disruption to the existing life of human beings.In this paper,the generation process of blockchain is explained in a simple and profound way,and the design and structure of blockchain is analyzed by combining with ethereum network,and related technical applications of blockchain are summarized.Based on the current market situation,this paper makes a brief analysis of the actual application scenarios and future development of blockchain technology.
作者 李双远 张明齐 LI Shuangyuan;ZHANG Mingqi(Information Center,Jilin Institute of Chemical Technology,Jilin City 132022,China)
出处 《吉林化工学院学报》 CAS 2019年第3期54-58,共5页 Journal of Jilin Institute of Chemical Technology
关键词 区块链 以太坊网络 去中心化 分布式数据库 blockchain ethereum decentralized distributed database
  • 相关文献

参考文献7

二级参考文献35

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:234
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 3王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 4Gartner. Gartner Says Worldwide Mobile Payment Transaction Valueto Surpass $235 Billion in 2013[EB/OL]. http://www.gartner.com/newsroom/id/2504915,2013—06—04.
  • 5McAfee.Security for Military—Grade Google Android Devices[EB/OL]. http://www.mcafee.com/sg/resources/solution—briefs/sb—security-military—grade—Android.pdf, 2013.
  • 6Zhou,Y., & Jiang, X. Dissecting android malware: Characterizationand evolution[C]In 2012 IEEE Symposium on Security and Privacy. 2012.95-109.
  • 7NVD. Vulnerability Summary for CVE—2011 —1149[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail.vulnld=CVE—2011—1149, 2011 —04—22.
  • 8NVD. Vulnerability Summary for CVE-2011 -1823[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail.vulnId=CVE—2011 — 1823, 2011 —04—25.
  • 9NVD. Vulnerability Summary for CVE-201 l—3874[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail.vulnId=CVE—2011—3874, 2012—02—06.
  • 10DuoSecurity[EB/OLJ. http://www.xray.io/,2014_08—06.

共引文献3045

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部