Indexed by:
Abstract:
Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization. © 2021 IEEE.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2021
Page: 227-231
Language: English
Cited Count:
SCOPUS Cited Count: 1
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 8
Affiliated Colleges: