{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:49Z","timestamp":1750308829857,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600321"},{"type":"electronic","value":"9783319600338"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60033-8_40","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T16:18:42Z","timestamp":1495815522000},"page":"457-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Bitcoin Based Incentive Mechanism for Distributed P2P Applications"],"prefix":"10.1007","author":[{"given":"Yunhua","family":"He","sequence":"first","affiliation":[]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: S&P, pp. 443\u2013458. IEEE (2014)","DOI":"10.1109\/SP.2014.35"},{"issue":"3","key":"40_CR2","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1109\/COMST.2015.2419819","volume":"17","author":"S Batabyal","year":"2015","unstructured":"Batabyal, S., Bhaumik, P.: Mobility models, traces and impact of mobility on opportunistic routing algorithms: a survey. IEEE Commun. Surv. Tuts. 17(3), 1679\u20131707 (2015)","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"40_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44381-1_24"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Chen, B., Chan, M.C.: Mobicent: a credit-based incentive system for disruption tolerant network. In: INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462136"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Duan, Z., Li, W., Cai, Z.: Distributed auctions for task assignment and scheduling in mobile crowdsensing systems. In: ICDCS (2017)","DOI":"10.1109\/ICDCS.2017.121"},{"issue":"4","key":"40_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2015.2506301","volume":"16","author":"Z Duan","year":"2016","unstructured":"Duan, Z., Yan, M., Cai, Z., Wang, X.: Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems. Sensors 16(4), 1\u201314 (2016)","journal-title":"Sensors"},{"issue":"5","key":"40_CR7","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/TMC.2011.101","volume":"11","author":"B Han","year":"2012","unstructured":"Han, B., Hui, P., Kumar, V.A., Marathe, M.V., Shao, J., Srinivasan, A.: Mobile data offloading through opportunistic communications and social participation. IEEE Trans. Mob. Comput. 11(5), 821\u2013834 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Moran, T., Bentov, I.: How to use bitcoin to play decentralized poker. In: CCS, pp. 195\u2013206 (2015)","DOI":"10.1145\/2810103.2813712"},{"issue":"11","key":"40_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2015.7321972","volume":"53","author":"H Li","year":"2015","unstructured":"Li, H., He, Y., Cheng, X., Zhu, H., Sun, L.: Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11), 56\u201362 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"40_CR10","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TCCN.2016.2620973","volume":"2","author":"W Li","year":"2016","unstructured":"Li, W., Cheng, X., Bie, R., Zhao, F.: An extensible and flexible truthful auction framework for heterogeneous spectrum markets. IEEE Trans. Cogn. Commun. Netw. 2(4), 427\u2013441 (2016)","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Li, W., Wang, S., Cheng, X.: Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks. In: ACM MobiCom Workshop CRAB (2013)","DOI":"10.1145\/2508478.2508482"},{"issue":"6","key":"40_CR12","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/TCSVT.2007.896635","volume":"17","author":"S Lian","year":"2007","unstructured":"Lian, S., Liu, Z., Ren, Z.: Commutative encryption and watermarking in video compression. IEEE Trans. Circ. Syst. Video Technol. 17(6), 774\u2013778 (2007)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"40_CR13","first-page":"3","volume":"16","author":"W Liu","year":"2014","unstructured":"Liu, W., Li, H., Chen, Y., Zhu, H.: Lares: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad. Ubiq. Co. 16(1), 3\u201313 (2014)","journal-title":"Int. J. Ad. Ubiq. Co."},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: CCS, pp. 706\u2013719 (2015)","DOI":"10.1145\/2810103.2813659"},{"issue":"4","key":"40_CR15","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TDSC.2012.37","volume":"9","author":"A Mei","year":"2012","unstructured":"Mei, A., Stefa, J.: Give2get: forwarding in social mobile wireless networks of selfish individuals. IEEE Trans. Depend. Secure 9(4), 569\u2013582 (2012)","journal-title":"IEEE Trans. Depend. Secure"},{"key":"40_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.comnet.2015.07.011","volume":"90","author":"H Mousa","year":"2015","unstructured":"Mousa, H., Mokhtar, S.B., Hasan, O., Younes, O., Hadhoud, M., Brunie, L.: Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput. Netw. 90, 49\u201373 (2015)","journal-title":"Comput. Netw."},{"key":"40_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, pp. 1\u201328 (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Ning, T., Yang, Z., Xie, X., Wu, H.: Incentive-aware data dissemination in delay-tolerant mobile networks. In: SECON, pp. 539\u2013547. IEEE (2011)","DOI":"10.1109\/SAHCN.2011.5984940"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Tarable, A., Nordio, A., Leonardi, E., Marsan, M.: The importance of being earnest in crowdsourcing systems. In: INFOCOM, pp. 2821\u20132829 (2015)","DOI":"10.1109\/INFOCOM.2015.7218675"},{"key":"40_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.016","volume":"102","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Cai, Z., Yin, G., Gao, Y.: An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102, 157\u2013171 (2016)","journal-title":"Comput. Netw."},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM, pp. 1987\u20131997. IEEE (2003)","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, H., Lin, X., Lu, R., Shen, X.S.: A secure incentive scheme for delay tolerant networks. In: ChinaCom, pp. 23\u201328. IEEE (2008)","DOI":"10.1109\/CHINACOM.2008.4684961"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60033-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:31:44Z","timestamp":1750278704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60033-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600321","9783319600338"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60033-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"27 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}