Social-Chain
暂无分享,去创建一个
[1] Dongqi Fu,et al. Blockchain-based trusted computing in social network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[2] Dominic Williams,et al. DFINITY Technology Overview Series, Consensus System , 2018, ArXiv.
[3] Dianhui Mao,et al. Credit Evaluation System Based on Blockchain for Multiple Stakeholders in the Food Supply Chain , 2018, International journal of environmental research and public health.
[4] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[5] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.
[6] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[7] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[8] Zheng Yan,et al. CloudFile: A cloud data access control system based on mobile social trust , 2017, J. Netw. Comput. Appl..
[9] Yuguang Fang,et al. A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[10] Athanasios V. Vasilakos,et al. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.
[11] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] Aggelos Kiayias,et al. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..
[13] Jian Shen,et al. Hierarchical Trust Level Evaluation for Pervasive Social Networking , 2017, IEEE Access.
[14] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[15] Jianguo Pan,et al. A Hybrid Trust Evaluation Framework for E-Commerce in Online Social Network: A Factor Enrichment Perspective , 2017, IEEE Access.
[16] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[17] Gustavo Alonso,et al. Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..
[18] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks , 2018, ArXiv.
[19] Vitalik Buterin,et al. Casper the Friendly Finality Gadget , 2017, ArXiv.
[20] Zheng Yan,et al. A novel scheme of anonymous authentication on trust in Pervasive Social Networking , 2018, Inf. Sci..
[21] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[22] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[23] Michal Koza,et al. Countermeasures against sybil attacks in WSN based on proofs-of-work , 2013, WiSec '13.
[24] Hui Li,et al. Blockchain-Based Secure Time Protection Scheme in IoT , 2019, IEEE Internet of Things Journal.
[25] Valtteri Niemi,et al. IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN) , 2018, IEEE Access.
[26] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[27] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[28] Yi Zhang,et al. A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.
[29] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[30] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[31] Laurence T. Yang,et al. MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[32] Jie Wu,et al. Trust Evaluation in Online Social Networks Using Generalized Network Flow , 2016, IEEE Transactions on Computers.
[33] Mehmet A. Orgun,et al. Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks , 2013, IEEE Transactions on Services Computing.
[34] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[35] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[36] Victor C. M. Leung,et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.
[37] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[38] Mohamed Baza,et al. Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.
[39] Ronghua Xu,et al. Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System , 2018, MobiQuitous.
[40] Ariel Gabizon,et al. Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.
[41] Hui Li,et al. Secure Time Synchronization Scheme in IoT Based on Blockchain , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[42] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[43] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[44] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[45] Victor C. M. Leung,et al. A blockchain-based reputation system for data credibility assessment in vehicular networks , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[46] Raimo Kantola,et al. Controlling Cloud Data Access Based on Reputation , 2015, Mob. Networks Appl..
[47] Zheng Yan,et al. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.
[48] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.