References
- Godsi P, "Bitcoin: bubble or blockchain," in Proc. of 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications, pp. 191-203, May 29, 2015.
- Kraft D, "Difficulty control for blockchain-based consensus systems," Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397-413, March, 2016. https://doi.org/10.1007/s12083-015-0347-x
- Swan M, "Blockchain thinking: the brain as a decentralized autonomous corporation," IEEE Technology and Society Magazine, vol. 34, no. 4, pp. 41-52, December, 2015. https://doi.org/10.1109/MTS.2015.2494358
- Eldred M, "Blockchain thinking and euphoric Hubris," IEEE Technology and Society Magazine, vol. 35, no. 1, pp. 39, March, 2016. https://doi.org/10.1109/MTS.2016.2535040
- Zyskind G, Nathan O and Pentland A S, "Decentralizing privacy: using blockchain to protect personal data," in Proc. of 2015 IEEE Security and Privacy Workshops, pp. 180-184, May 21-22, 2015.
- Wilson D and Ateniese G, "From pretty good to great: enhancing PGP using Bitcoin and the blockchain," in Proc. of 9th International Conference on Network and System Security, pp. 368-375, November 3-5, 2015.
- Kypriotaki K N, Zamani E D and Giaglis G M, "From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networksand blockchains," in Proc. of 17th International Conference on Enterprise Information Systems, pp. 284-290, April 27-30, 2015.
- George H, "Might the Blockchain Outlive Bitcoin?" IT Professional, vol. 18, no. 2, pp. 12-16, March-April, 2016. https://doi.org/10.1109/MITP.2016.21
- Nakamoto S, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008
- Pai V, Kumar K, Tamilmani K, Sambamurthy V and Mohr A E, "Chainsaw: eliminating trees from overlay multicast," in Proc. of 4th International Workshop on Peer-to-Peer Systems, pp. 127-140, February 24-25, 2005.
- Biskupski B, Schiely M, Felber P and Meier R, "Tree-based analysis of mesh overlays for peer-to-peer streaming," in Proc. of 8th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, pp. 126-139, June 4-6, 2008.
- Mokhtarian K and Jacobsen H A, "Minimum-Delay multicast algorithms for mesh overlays," IEEE/ACM Transactions on Networking, vol. 23, no. 3, pp. 973-986, June, 2015. https://doi.org/10.1109/TNET.2014.2310735
- Kim K, Mehrotra S and Venkatasubramanian N, "Efficient and reliable application layer multicast for flash dissemination," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 2571-2582, October, 2014. https://doi.org/10.1109/TPDS.2013.280
- Liu T S, Li J, Cao Q N. "Study on a network communication optimization algorithm of P2P mode," in Proc. of Artificial Intelligence and Computational Intelligence, pp. 212-217, November, 7-8, 2009.
- Liu T S, Yang K Y, Li J, "Study on a concurrent communication tree algorithm of P2P multi-link mode," in Proc. of International Conference on Multimedia Technology, pp. 2034-2038, October 29-31, 2010.
- Liu T S, Zhang LM, Cheng G J, Li J and Yang K Y, "FIN multicast optimization algorithm in P2P communication," Application Research of Computers, vol. 30, no. 5, pp. 1464-1466&1491, May, 2013.
- Tan Z H, Wang XW and Wang X Y, "A novel iterative and dynamic trust computing model for large scaled P2P networks," Mobile Information Systems, no. 4, pp. 1-12, April, 2016.
- Jia M J, Wang H Q, Ye B and Wang Y, "A dynamic grouping-based trust model for mobile P2P networks", in Proc. of 2016 IEEE International Conference on Services Computing, pp. 848-851, June 27, 2016.
- Liao J and Li Z, "A novel dynamic trust model for P2P network," Open Automation and Control Systems Journal, vol. 7, no. 1, pp. 893-901, August, 2015. https://doi.org/10.2174/1874444301507010893
- Wang Q J, Wang J R, Yu J and Yu M, "Trust-aware query routing in P2P social networks," International Journal of Communication Systems, vol. 25, no. 10, pp. 1260-1280, October, 2012. https://doi.org/10.1002/dac.1320
- Shen Y, Feng J, Ma W J, Jiang L and Yin M., "Overlay multicast update strategy based on perturbation theory," KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 171-192, January, 2017. https://doi.org/10.3837/tiis.2017.01.009
- Alekseev S and Schafer J, "Evaluation of a topological distance algorithm for construction of a P2P multicast hybrid overlay tree," International Journal of Computer Networks and Communications, vol. 8, no. 1, pp. 1-12, January, 2016.
- Wei W, Yang X L, Shen P Y and Zhou B., "Holes detection in anisotropic sensornets: topological methods," International Journal of Distributed Sensor Networks, vol. 8, no. 10, October 23, 2012.
- Wei W and Qi Y., "Information potential fields navigation in wireless Ad-Hoc sensor networks," Sensors, vol. 11, no. 5, pp. 4794-4807, May, 2011. https://doi.org/10.3390/s110504794
- Wei W, Xu Q, Wang L, Hei X H, Shen P, Shi W and Shan L., "GI/Geom/1 queue based on communication model for mesh networks," International Journal of Communication Systems, vol. 27, no. 11, pp. 3013-3029, November, 2014. https://doi.org/10.1002/dac.2522
- Li J and Liu T S, "Study on a P2P communication tree algorithm based on multi-link," Northwest University Journal: Natural Science, vol. 40, no. 6, pp. 970-974, November, 2010.
- Selvaraj C and Anand S, "A survey on security issues of reputation management systems for peer-to-peer networks," Computer science review, vol. 6, no. 4, pp. 145-160, July, 2012. https://doi.org/10.1016/j.cosrev.2012.04.001
- Duarte J, Siegel S and Young L, "Trust and credit: the role of appearance in peer-to-peer lending," Review of Financial Studies, vol. 25, no. 8, pp. 2455-2484, August, 2012. https://doi.org/10.1093/rfs/hhs071
- Huang G M, Hu M, Zhou Y, Liu P S, and Zhang Y C, "A distributed trust model based on reputation management of peers for P2P VoD services," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2285-2301, September, 2012. https://doi.org/10.3837/tiis.2012.09.018
- Sanchez D, Martinez S and Domingo-Ferrer J, "Co-utile P2P ridesharing via decentralization and reputation management," Transportation Research Part C: Emerging Technologies, vol. 73, pp. 147-166, December, 2016. https://doi.org/10.1016/j.trc.2016.10.017
- Song H B and Maite B P. "Model-centric nonlinear equalizer for coherent long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2394-2399, December 9-13, 2013.
- Song H B, Maite B P, Xie T J and Wilson Stephen G, "Combined constrained code and LDPC code for long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2984-2989, December 3-7, 2012.
- Li J, Liang G Q, Liu T S and Li X J, "P2P multicast algorithm considering node service priority," Application Research of Computers, vol. 34, no. 4, pp. 1176-1179, April, 2017.
Cited by
- A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks vol.19, pp.4, 2017, https://doi.org/10.3390/s19040970
- Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain vol.20, pp.2, 2019, https://doi.org/10.7472/jksii.2019.20.2.61
- Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer vol.20, pp.5, 2017, https://doi.org/10.7472/jksii.2019.20.5.9
- Assessing the authenticity of subjective information in the blockchain: a survey and open issues vol.24, pp.2, 2017, https://doi.org/10.1007/s11280-020-00854-3