{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:17:53Z","timestamp":1740100673220,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010450","name":"Nova","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010450","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.1109\/cscwd54268.2022.9776110","type":"proceedings-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T19:39:11Z","timestamp":1653075551000},"page":"35-40","source":"Crossref","is-referenced-by-count":1,"title":["A Trusted Notifier Reporting Framework for Incentive DNS Abuse Mitigation Based on Blockchain"],"prefix":"10.1109","author":[{"given":"Xuebiao","family":"Yuchi","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]},{"given":"Sirui","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]},{"given":"Zhiwei","family":"Yan","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]},{"given":"Kejun","family":"Dong","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]},{"given":"Hongtao","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]},{"given":"Zhiyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Naming and Addressing,China Internet Network Information Center,Beijing,China,100190"}]}],"member":"263","reference":[{"journal-title":"Internet & Jurisdiction Policy Network","article-title":"Norms, Criteria, Mechanisms. I&J Outcome","year":"2019","key":"ref4"},{"key":"ref3","article-title":"Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs","author":"korczy?ski","year":"2018","journal-title":"Proceedings of ACM Asia Conference on Computer and Communications Security (ASIA CCS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3158333"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359836"},{"key":"ref11","first-page":"71","article-title":"A Reputation Scheme for a Blockchain-based Network Cooperative Defense","author":"gruhler","year":"2019","journal-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM) IM"},{"journal-title":"Internet & Jurisdiction Policy Network","article-title":"DNS Technical Abuse: Choice of Action, I&J Outcome (REF: 20-114)","year":"2020","key":"ref5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.05.035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00045"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849614"},{"article-title":"IPFS - Content Addressed, Versioned, P2P File System","year":"2014","author":"benet","key":"ref2"},{"key":"ref9","first-page":"181","article-title":"Blockstack: A Global Naming and Storage System Secured by Blockchains","author":"ali","year":"2016","journal-title":"Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC&#x2019;16)"},{"key":"ref1","article-title":"Domain names - concepts and facilities","author":"mockapetris","year":"0","journal-title":"RFC 1034"}],"event":{"name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2022,5,4]]},"location":"Hangzhou, China","end":{"date-parts":[[2022,5,6]]}},"container-title":["2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9775971\/9776016\/09776110.pdf?arnumber=9776110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:22:18Z","timestamp":1655760138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9776110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cscwd54268.2022.9776110","relation":{},"subject":[],"published":{"date-parts":[[2022,5,4]]}}}