Social-Chain

[1]  Dongqi Fu,et al.  Blockchain-based trusted computing in social network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[2]  Dominic Williams,et al.  DFINITY Technology Overview Series, Consensus System , 2018, ArXiv.

[3]  Dianhui Mao,et al.  Credit Evaluation System Based on Blockchain for Multiple Stakeholders in the Food Supply Chain , 2018, International journal of environmental research and public health.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  Chrysanthos Dellarocas,et al.  Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.

[6]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[7]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[8]  Zheng Yan,et al.  CloudFile: A cloud data access control system based on mobile social trust , 2017, J. Netw. Comput. Appl..

[9]  Yuguang Fang,et al.  A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[10]  Athanasios V. Vasilakos,et al.  Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[11]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Aggelos Kiayias,et al.  Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..

[13]  Jian Shen,et al.  Hierarchical Trust Level Evaluation for Pervasive Social Networking , 2017, IEEE Access.

[14]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[15]  Jianguo Pan,et al.  A Hybrid Trust Evaluation Framework for E-Commerce in Online Social Network: A Factor Enrichment Perspective , 2017, IEEE Access.

[16]  Mariana Raykova,et al.  RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.

[17]  Gustavo Alonso,et al.  Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..

[18]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks , 2018, ArXiv.

[19]  Vitalik Buterin,et al.  Casper the Friendly Finality Gadget , 2017, ArXiv.

[20]  Zheng Yan,et al.  A novel scheme of anonymous authentication on trust in Pervasive Social Networking , 2018, Inf. Sci..

[21]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[22]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[23]  Michal Koza,et al.  Countermeasures against sybil attacks in WSN based on proofs-of-work , 2013, WiSec '13.

[24]  Hui Li,et al.  Blockchain-Based Secure Time Protection Scheme in IoT , 2019, IEEE Internet of Things Journal.

[25]  Valtteri Niemi,et al.  IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN) , 2018, IEEE Access.

[26]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[27]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[28]  Yi Zhang,et al.  A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.

[29]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[30]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[31]  Laurence T. Yang,et al.  MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[32]  Jie Wu,et al.  Trust Evaluation in Online Social Networks Using Generalized Network Flow , 2016, IEEE Transactions on Computers.

[33]  Mehmet A. Orgun,et al.  Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks , 2013, IEEE Transactions on Services Computing.

[34]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[35]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[36]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[37]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[38]  Mohamed Baza,et al.  Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.

[39]  Ronghua Xu,et al.  Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System , 2018, MobiQuitous.

[40]  Ariel Gabizon,et al.  Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.

[41]  Hui Li,et al.  Secure Time Synchronization Scheme in IoT Based on Blockchain , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[42]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[43]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[44]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[45]  Victor C. M. Leung,et al.  A blockchain-based reputation system for data credibility assessment in vehicular networks , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[46]  Raimo Kantola,et al.  Controlling Cloud Data Access Based on Reputation , 2015, Mob. Networks Appl..

[47]  Zheng Yan,et al.  Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.

[48]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.