{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T09:59:15Z","timestamp":1685959155532},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11390-021-0583-x","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:02:42Z","timestamp":1645160562000},"page":"266-276","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Blockchain-Based Protocol for Malicious Price Discrimination"],"prefix":"10.1007","volume":"37","author":[{"given":"Li-De","family":"Xue","sequence":"first","affiliation":[]},{"given":"Ya-Jun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wei-Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Liu-Sheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"issue":"1","key":"583_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.2307\/2555815","volume":"29","author":"JJ Laffont","year":"1998","unstructured":"Laffont J J, Rey P, Tirole J. Network competition: II. Price discrimination. The RAND Journal of Economics, 1998, 29(1): 38-56. https:\/\/doi.org\/10.2307\/2555815.","journal-title":"The RAND Journal of Economics"},{"key":"583_CR2","doi-asserted-by":"crossref","unstructured":"Varian H R. Price discrimination. In Handbook of Industrial Organization, Schmalensee R, Willig R (eds.), North Halland, 1989, pp.597-654.","DOI":"10.1016\/S1573-448X(89)01013-7"},{"key":"583_CR3","doi-asserted-by":"publisher","unstructured":"Pigou A C. Discriminating monopoly. In The Economics of Welfare, Pigou A C, Aslanbeigui N (eds.), Routledge, 2002, pp.275-289. https:\/\/doi.org\/10.4324\/9781351304368.","DOI":"10.4324\/9781351304368"},{"key":"583_CR4","doi-asserted-by":"publisher","unstructured":"Belleamme P, Peitz M. Group pricing and personalized pricing. In Industrial Organization: Markets and Strategies (2nd edition), Belleamme P, Peitz M (eds.), Cambridge University Press, 2015, pp.197-219. https:\/\/doi.org\/10.1017\/CBO9781107707139.014.","DOI":"10.1017\/CBO9781107707139.014"},{"issue":"2","key":"583_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s12525-014-0165-7","volume":"25","author":"T Rayna","year":"2015","unstructured":"Rayna T, Darlington J, Striukova L. Pricing music using personal data: Mutually advantageous first-degree price discrimination. Electronic Markets, 2015, 25(2): 139-154. https:\/\/doi.org\/10.1007\/s12525-014-0165-7.","journal-title":"Electronic Markets"},{"key":"583_CR6","unstructured":"Shiller B R. First degree price discrimination using big data. Technical Report, Department of Economics and International Business School, Brandeis University, 2014. https:\/\/www.brandeis.edu\/economics\/RePEc\/brd\/doc\/Brandeis WP58R2.pdf, Dec. 2020."},{"key":"583_CR7","unstructured":"Shiller B R. Personalized price discrimination using big data. Technical Report, Department of Economics and International Business School, Brandeis University, 2016, https:\/\/www.brandeis.edu\/economics\/RePEc\/brd\/doc\/Brandeis WP108.pdf, Dec. 2020."},{"issue":"11","key":"583_CR8","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","volume":"38","author":"N Kshetri","year":"2014","unstructured":"Kshetri N. Big data\u2019s impact on privacy, security and consumer welfare. Telecommunications Policy, 2014, 38(11): 1134-1145. https:\/\/doi.org\/10.1016\/j.telpol.2014.10.002.","journal-title":"Telecommunications Policy"},{"issue":"12","key":"583_CR9","first-page":"60","volume":"177","author":"Z Zhao","year":"2019","unstructured":"Zhao Z. Big data price discrimination is repeated, why do \u201cctrips\u201d choose to do evil? Business School, 2019, 177(12): 60-62. (in Chinese)","journal-title":"Business School"},{"issue":"6","key":"583_CR10","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.2139\/ssrn.2817523","volume":"68","author":"RA Woodcock","year":"2017","unstructured":"Woodcock R A. Big data, price discrimination, and antitrust. Hastings Law Journal, 2017, 68(6): 1371-1420. https:\/\/doi.org\/10.2139\/ssrn.2817523.","journal-title":"Hastings Law Journal"},{"key":"583_CR11","doi-asserted-by":"publisher","unstructured":"Steppe R. Online price discrimination and personal data: A general data protection regulation perspective. Computer Law & Security Review, 2017, 33(6): 768-785. https:\/\/doi.org\/10.1016\/j.clsr.2017.05.008.","DOI":"10.1016\/j.clsr.2017.05.008"},{"issue":"4","key":"583_CR12","first-page":"870","volume":"75","author":"HR Varian","year":"1985","unstructured":"Varian H R. Price discrimination and social welfare. The American Economic Review, 1985, 75(4): 870-875.","journal-title":"The American Economic Review"},{"issue":"285","key":"583_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1111\/j.0013-0427.2005.00407.x","volume":"72","author":"T Adachi","year":"2005","unstructured":"Adachi T. Third-degree price discrimination, consumption externalities and social welfare. Economica, 2005, 72(285): 171-178. https:\/\/doi.org\/10.1111\/j.0013-0427.2005.00407.x.","journal-title":"Economica"},{"issue":"1","key":"583_CR14","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1257\/aer.90.1.240","volume":"90","author":"Y Yoshida","year":"2000","unstructured":"Yoshida Y. Third-degree price discrimination in input markets: Output and welfare. American Economic Review, 2000, 90(1): 240-246. https:\/\/doi.org\/10.1257\/aer.90.1.240.","journal-title":"American Economic Review"},{"key":"583_CR15","unstructured":"Tirole J. The Theory of Industrial Organization (1st edition). MIT Press Books, 1988."},{"issue":"1","key":"583_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1467-6451.2011.00443.x","volume":"59","author":"R Inderst","year":"2011","unstructured":"Inderst R, Valletti T M. Buyer power and the \u201cwaterbed effect\u201d. The Journal of Industrial Economics, 2011, 59(1): 1-20. https:\/\/doi.org\/10.1111\/j.1467-6451.2011.00443.x.","journal-title":"The Journal of Industrial Economics"},{"issue":"4","key":"583_CR17","first-page":"728","volume":"76","author":"D Kahneman","year":"1986","unstructured":"Kahneman D, Knetsch J L, Thaler R. Fairness as a constraint on profit seeking: Entitlements in the market. The American Economic Review, 1986, 76(4): 728-741.","journal-title":"The American Economic Review"},{"issue":"4","key":"583_CR18","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1111\/j.0022-1821.2004.00236.x","volume":"52","author":"MR Baye","year":"2004","unstructured":"Baye M R, Morgan J, Scholten P. Price dispersion in the small and in the large: Evidence from an internet price comparison site. The Journal of Industrial Economics, 2004, 52(4): 463-496, https:\/\/doi.org\/10.1111\/j.0022-1821.2004.00236.x.","journal-title":"The Journal of Industrial Economics"},{"key":"583_CR19","doi-asserted-by":"publisher","unstructured":"Thomas R G. Non-risk price discrimination in insurance: Market outcomes and public policy. The Geneva Papers on Risk and Insurance\u2014Issues and Practice, 2012, 37(1): 27-46. https:\/\/doi.org\/10.1057\/gpp.2011.32.","DOI":"10.1057\/gpp.2011.32"},{"key":"583_CR20","unstructured":"Marks M, Marks J. Bidding method for Internet\/wireless advertising and priority ranking in search results. https:\/\/www.freepatentsonline.com\/20010051911.pdf, Dec. 2020."},{"issue":"1","key":"583_CR21","first-page":"1","volume":"12","author":"BJ Jansen","year":"2011","unstructured":"Jansen B J, Schuster S. Bidding on the buying funnel for sponsored search and keyword advertising. Journal of Electronic Commerce Research, 2011, 12(1): 1-18.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"2","key":"583_CR22","doi-asserted-by":"publisher","first-page":"427","DOI":"10.3982\/ECTA5708","volume":"77","author":"G Ellison","year":"2010","unstructured":"Ellison G, Ellison S F. Search, obfuscation, and price elasticities on the Internet. Econometrica, 2010, 77(2): 427-452. https:\/\/doi.org\/10.3982\/ECTA5708.","journal-title":"Econometrica"},{"key":"583_CR23","doi-asserted-by":"publisher","unstructured":"Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol with chains of variable difficulty. In Proc. the 37th Annual International Cryptology Conference, August 2017, pp.291-323. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_10.","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"583_CR24","doi-asserted-by":"publisher","unstructured":"Huckle S, Bhattacharya R, White M, Beloff N. Internet of things, blockchain and shared economy applications. Procedia Computer Science, 2016, 98: pp.461-466. https:\/\/doi.org\/10.1016\/j.procs.2016.09.074.","DOI":"10.1016\/j.procs.2016.09.074"},{"key":"583_CR25","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of Things. IEEE Access, 2016, 4: 2292-2303. https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339.","journal-title":"IEEE Access"},{"issue":"4","key":"583_CR26","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N. Can blockchain strengthen the Internet of Things? IEEE IT Professional, 2017, 19(4): 68-72. https:\/\/doi.org\/10.1109\/MITP.2017.3051335.","journal-title":"IEEE IT Professional"},{"key":"583_CR27","doi-asserted-by":"publisher","unstructured":"Conoscenti M, Vetr\u00f2 A, De Martin J C D. Blockchain for the Internet of Things: A systematic literature review. In Proc. the 13th IEEE\/ACS International Conference of Computer Systems and Applications, November 29\u2013December 2, 2016. https:\/\/doi.org\/10.1109\/AICCSA.2016.7945805.","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"583_CR28","doi-asserted-by":"publisher","unstructured":"Dorri A, Kanhere S S, Jurdak R, Gauravaram P. Blockchain for IoT security and privacy: The case study of a smart home. In Proc. the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), March 2017, pp.618-623. https:\/\/doi.org\/10.1109\/PERCOMW.2017.7917634.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"2","key":"583_CR29","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/LCOMM.2018.2883629","volume":"23","author":"V Sharma","year":"2019","unstructured":"Sharma V. An energy-efficient transaction model for the blockchain-enabled Internet of Vehicles (IoV). IEEE Communications Letters, 2019, 23(2): 246-249. https:\/\/doi.org\/10.1109\/LCOMM.2018.2883629.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"583_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","volume":"32","author":"H Liu","year":"2018","unstructured":"Liu H, Zhang Y, Yang T. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Network, 2018, 32(3): 78-83. https:\/\/doi.org\/10.1109\/MNET.2018.1700344.","journal-title":"IEEE Network"},{"issue":"3","key":"583_CR31","doi-asserted-by":"publisher","first-page":"4640","DOI":"10.1109\/JIOT.2018.2874398","volume":"6","author":"T Jiang","year":"2019","unstructured":"Jiang T, Fang H, Wang H. Blockchain-based Internet of Vehicles: Distributed network architecture and performance analysis. IEEE Internet of Things Journal, 2019, 6(3): 4640-4649. https:\/\/doi.org\/10.1109\/JIOT.2018.2874398.","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"583_CR32","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1109\/TVT.2019.2894944","volume":"68","author":"J Kang","year":"2019","unstructured":"Kang J, Xiong Z, Niyato D, Ye D, Kim D I, Zhao J. Toward secure blockchain-enabled Internet of Vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Vehicular Technology, 2019, 68(3): 2906-2920. https:\/\/doi.org\/10.1109\/TVT.2019.2894944.","journal-title":"IEEE Trans. Vehicular Technology"},{"issue":"5","key":"583_CR33","doi-asserted-by":"publisher","first-page":"2438","DOI":"10.1109\/TDSC.2019.2952332","volume":"18","author":"J Weng","year":"2018","unstructured":"Weng J, Weng J, Li M, Zhang Y, Luo W. DeepChain: Auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing, 2018, 18(5): 2438-2455. https:\/\/doi.org\/10.1109\/TDSC.2019.2952332.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"583_CR34","unstructured":"Cheng K, Fan T, Jin Y, Liu Y, Chen T, Yang Q. Secure-boost: A lossless federated learning framework. arXiv:1901.08755, 2019. http:\/\/arxiv.org\/abs\/1901.08755, Dec. 2020."},{"key":"583_CR35","unstructured":"Zhuo H H, Feng W, Xu Q, Yang Q, Lin Y. Federated reinforcement learning. arXiv:1901.08277, 2019. http:\/\/arxiv.org\/abs\/1901.08277, Dec. 2020."},{"key":"583_CR36","unstructured":"Sompolinsky Y, Zohar A. PHANTOM: A scalable blockDAG protocol. http:\/\/eprint.iacr.org\/2018\/104, Dec. 2020."},{"key":"583_CR37","doi-asserted-by":"crossref","unstructured":"Xiao S, Wang X A, Wang H. Large-scale electronic voting based on conux consensus mechanism. In Proc. the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2019, pp.291-299. 10.1007\/978-3-030-22263-5_28.","DOI":"10.1007\/978-3-030-22263-5_28"},{"key":"583_CR38","doi-asserted-by":"publisher","unstructured":"Andrychowicz M, Dziembowski S. PoW-based distributed cryptography with no trusted setup. In Proc. the 35th Annual Cryptology Conference, August 2015, pp.379-399. https:\/\/doi.org\/10.1007\/978-3-662-48000-7_19.","DOI":"10.1007\/978-3-662-48000-7_19"},{"key":"583_CR39","doi-asserted-by":"publisher","unstructured":"Gilad Y, Hemo R, Micali S et al. Algorand: Scaling Byzantine agreements for cryptocurrencies. In Proc. the 26th Symposium on Operating Systems Principles, October 2017, pp.51-68. https:\/\/doi.org\/10.1145\/3132747.3132757.","DOI":"10.1145\/3132747.3132757"},{"issue":"3","key":"583_CR40","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Trans. Programming Languages and Systems, 1982, 4(3): 382-401. https:\/\/doi.org\/10.1145\/357172.357176.","journal-title":"ACM Trans. Programming Languages and Systems"},{"key":"583_CR41","unstructured":"Eyal I, Gencer A E, Sirer E G et al. Bitcoin-NG: A scalable blockchain protocol. In Proc. the 13th USENIX Symposium on Networked Systems Design and Implementation, March 2016, pp.45-59."},{"key":"583_CR42","unstructured":"Kogias E K, Jovanovic P, Gailly N et al. Enhancing bitcoin security and performance with strong consistency via collective signing. In Proc. the 25th USENIX Security Symposium, August 2016, pp.279-296."},{"issue":"3","key":"583_CR43","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1023\/A:1007953214631","volume":"12","author":"K Schossmaier","year":"1997","unstructured":"Schossmaier K, Schmid U, Horauer M, Loy D. Specification and implementation of the universal time coordinated synchronization unit (UTCSU). Real-Time Systems, 1997, 12(3): 295-327. https:\/\/doi.org\/10.1023\/A:1007953214631.","journal-title":"Real-Time Systems"},{"issue":"6","key":"583_CR44","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/0967-0661(95)00073-4","volume":"3","author":"U Schmid","year":"1995","unstructured":"Schmid U. Synchronized universal time coordinated for distributed real-time systems. Control Engineering Practice, 1995, 3(6): 877-884. https:\/\/doi.org\/10.1016\/0967-0661(95)00073-4.","journal-title":"Control Engineering Practice"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-0583-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-021-0583-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-0583-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:21:12Z","timestamp":1645161672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-021-0583-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["583"],"URL":"https:\/\/doi.org\/10.1007\/s11390-021-0583-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"6 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}