A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
暂无分享,去创建一个
Xiuzhen Cheng | Hong Li | Yunhua He | Chao Yang | Limin Sun | Yan Liu | Limin Sun | Xiuzhen Cheng | Hong Li | Yunhua He | Chao Yang | Yan Liu
[1] Alessandro Aldini,et al. Virtual currency and reputation-based cooperation incentives in user-centric networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[3] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[4] Jason Teutsch,et al. Demystifying Incentives in the Consensus Computer , 2015, CCS.
[5] Prem Prakash Jayaraman,et al. Using On-the-Move Mining for Mobile Crowdsensing , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.
[6] Raphael M. Reischuk,et al. IKP: Turning a PKI Around with Decentralized Automated Incentives , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Mun Choon Chan,et al. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.
[8] Janise McNair,et al. In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[9] Luca Foschini,et al. Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing , 2017, IEEE Access.
[10] Hongyi Wu,et al. Incentive-aware data dissemination in delay-tolerant mobile networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[11] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Luca Foschini,et al. Crowdsensing with Social Network-Aided Collaborative Trust Scores , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[13] Azzedine Boukerche,et al. Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications , 2014 .
[14] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[15] Levente Buttyán,et al. Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[16] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[17] Mohsen Guizani,et al. On WiFi Offloading in Heterogeneous Networks: Various Incentives and Trade-Off Strategies , 2016, IEEE Communications Surveys & Tutorials.
[18] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.
[19] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[20] Jiguo Yu,et al. An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets , 2014, IEEE Transactions on Cognitive Communications and Networking.
[21] Suvadip Batabyal,et al. Mobility Models, Traces and Impact of Mobility on Opportunistic Routing Algorithms: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[22] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[23] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[24] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[25] Youngbin Im,et al. SVC-TChain: Incentivizing good behavior in layered P2P video streaming , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[26] Xiaodong Lin,et al. A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.
[27] Rami Khalil,et al. Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..
[28] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.
[29] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[30] Honggang Zhang,et al. Incentive mechanism for proximity-based Mobile Crowd Service systems , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[31] Inseok Hwang,et al. CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments , 2016, IEEE Transactions on Mobile Computing.
[32] Kyunghan Lee,et al. Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.
[33] Lionel Brunie,et al. Trust management and reputation systems in mobile participatory sensing applications: A survey , 2015, Comput. Networks.
[34] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[35] Yang Gao,et al. An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.
[36] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[37] Mahfoud Benchaïba,et al. A survey of incentive mechanisms in static and mobile P2P systems , 2015, J. Netw. Comput. Appl..