{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:26:49Z","timestamp":1772119609965,"version":"3.50.1"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872006"],"award-info":[{"award-number":["61872006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472005"],"award-info":[{"award-number":["61472005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/tcss.2020.2990103","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T20:49:09Z","timestamp":1589921349000},"page":"790-801","source":"Crossref","is-referenced-by-count":115,"title":["Security and Trust in Blockchains: Architecture, Key Technologies, and Open Issues"],"prefix":"10.1109","volume":"7","author":[{"given":"Peiyun","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5408-8752","authenticated-orcid":false,"given":"Mengchu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_27"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2016.27"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844400"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2740569"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938841"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343261"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805837"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.3791019"},{"key":"ref33","first-page":"1","article-title":"Teechan: Payment channels using trusted execution environments","author":"lind","year":"2017","journal-title":"Proc 4th Workshop Bitcoin Block-Chain Res (BITCOIN)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510817"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2901840"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.jnca.2015.12.005","article-title":"Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks","volume":"62","author":"xia","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref37","author":"jia","year":"2018","journal-title":"Op Ed The Many Faces of Sharding for Blockchain Scalability"},{"key":"ref36","article-title":"Chainspace: A sharded smart contracts platform","author":"al-bassam","year":"2017","journal-title":"arXiv 1708 03778"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2913621"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2904633"},{"key":"ref62","article-title":"Blockchain based trust & authentication for decentralized sensor networks","author":"moinet","year":"2017","journal-title":"arXiv 1706 01730"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4396-4"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2918467"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.026"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974537"},{"key":"ref65","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial Internet of Things","volume":"14","author":"li","year":"2018","journal-title":"IEEE Trans Ind Informat"},{"key":"ref29","first-page":"1","article-title":"Hybrid consensus: Efficient consensus in the permissionless model","author":"pass","year":"2017","journal-title":"31st Intl Symp on Distributed Computing (DISC)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571047"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801266"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2017.8210847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801266"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2865526"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00086"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.025"},{"key":"ref21","first-page":"1","year":"2018","journal-title":"The trust chain consensus COTI A decentralised and trust-based online payment system with arbitration service"},{"key":"ref24","first-page":"38","article-title":"The second-preimage attack to blockchain based on the structure of Merkle hash tree","volume":"1","author":"wang","year":"2018","journal-title":"Netinfo Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.24.12146"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00006"},{"key":"ref25","first-page":"1474","article-title":"Blockchain application development techniques","volume":"28","author":"cai","year":"2017","journal-title":"J Softw"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812166"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref95","first-page":"1","article-title":"An intelligent optimization method for optimal virtual machine allocation in cloud computing systems","author":"zhang","year":"2020","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","article-title":"The security and trust in fog computing environment","volume":"88","author":"zhang","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2017.2693688"},{"key":"ref92","article-title":"A trust model based on double-blind anonymous evaluation in public clouds","author":"zhang","year":"0","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref91","article-title":"Adaptive adjustment of dynamic detection cycle for fault detection in clouds","author":"zhang","year":"0","journal-title":"IEEE Trans Ind Informat"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2846646"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877634"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2924442"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2972837"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25527-9_11"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref10","first-page":"3766","article-title":"A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication","volume":"11","author":"li","year":"2017","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref11","first-page":"481","article-title":"Blockchain: The state of the art and future trends","volume":"42","author":"yuan","year":"2016","journal-title":"Acta Autom Sinica"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894944"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8605987"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895302"},{"key":"ref14","article-title":"BLOCKBENCH: A framework for analyzing private blockchains","author":"tuan anh dinh","year":"2017","journal-title":"arXiv 1703 04057"},{"key":"ref15","first-page":"1","article-title":"Trust, but verify: Why the blockchain needs the law","volume":"284440","author":"werbach","year":"2018","journal-title":"Berkeley Technol Law J"},{"key":"ref16","article-title":"Trust and verifiable computation for smart contracts in permissionless blockchains","author":"harz","year":"2017"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823705"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884764"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2883275"},{"key":"ref84","first-page":"310","article-title":"Reputation-based trust evaluation mechanism for decentralized environments and its applications based on smart contracts","author":"chan","year":"2017","journal-title":"Advances in Computer Science and Ubiquitous Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1126\/science.1136800"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.023"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2973864"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.048"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2918162"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2019.8820294"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866512"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.59"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571042"},{"key":"ref45","article-title":"On scalability of blockchain technologies","author":"gencer","year":"2017"},{"key":"ref48","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref47","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc Symp Networked Systems Design and Implementation (NSDI)"},{"key":"ref42","first-page":"1","author":"schwartz","year":"2014","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref41","article-title":"Solida: A blockchain protocol based on reconfigurable Byzantine consensus","author":"abraham","year":"2016","journal-title":"arXiv 1612 02916"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191553"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/9113768\/09096382.pdf?arnumber=9096382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:30:26Z","timestamp":1651080626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9096382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":95,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2020.2990103","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}