A blockchain-based Trust System for the Internet of Things
暂无分享,去创建一个
Roberto Di Pietro | Matteo Signorini | Erez Waisbard | Xavier Salleras | R. D. Pietro | Erez Waisbard | Matteo Signorini | Xavier Salleras
[1] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[2] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[3] José Manuel Moya,et al. A Taxonomy of Trust and Reputation System Attacks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Richard Dennis,et al. Rep on the roll:a peer to peer reputation system based on a rolling blockchain , 2016 .
[5] Ingoo Han,et al. The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement , 2007, Int. J. Electron. Commer..
[6] Muneeb Ali,et al. Bootstrapping Trust in Distributed Systems with Blockchains , 2016, login Usenix Mag..
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Gary E. Bolton,et al. How Effective are Online Reputation Mechanisms? An Experimental Study , 2004, Manag. Sci..
[9] Mirosław Kutyłowski,et al. ICT Systems Security and Privacy Protection , 2018, IFIP Advances in Information and Communication Technology.
[10] Paul A. Pavlou,et al. Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..
[11] Yang Yang,et al. Introduction to bitcoins: a pseudo-anonymous electronic currency system , 2011, CASCON.
[12] Paul Resnick,et al. Reputation systems , 2000, CACM.
[13] Nicolas Christin,et al. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.
[14] Roberto Di Pietro,et al. CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT , 2017, 2017 IEEE International Conference on Communications (ICC).
[15] Lionel Brunie,et al. A Trustless Privacy-Preserving Reputation System , 2016, SEC.
[16] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[17] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.