{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:39:00Z","timestamp":1740177540738,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032005","61872089","62277010"],"award-info":[{"award-number":["62032005","61872089","62277010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Foundation of Fujian Provincial Science and Technology Agency","award":["2020J02016","2020J01171","2020J01132452"],"award-info":[{"award-number":["2020J02016","2020J01171","2020J01132452"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Sustain. Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tsusc.2023.3308081","type":"journal-article","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T17:27:43Z","timestamp":1692898063000},"page":"88-99","source":"Crossref","is-referenced-by-count":0,"title":["Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2735-2359","authenticated-orcid":false,"given":"Xu","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer and Control Engineering, Minjiang University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5621-767X","authenticated-orcid":false,"given":"Xuechao","family":"Yang","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Science, Victoria University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2974-8835","authenticated-orcid":false,"given":"Junwei","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7351-5724","authenticated-orcid":false,"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5512-114X","authenticated-orcid":false,"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-3593","authenticated-orcid":false,"given":"Shangqi","family":"Lai","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61, Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6773-5245","authenticated-orcid":false,"given":"Wei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3090-1059","authenticated-orcid":false,"given":"Albert Y.","family":"Zomaya","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Sydney, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741650"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23041"},{"key":"ref8","first-page":"464","article-title":"Beaver: A decentralized anonymous marketplace with secure reputation","author":"Soska","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref9","first-page":"583","article-title":"AnonRep: Towards tracking-resistant anonymous reputation","volume-title":"Proc. 13th USENIX Symp. Netw. Syst. Des. Implementation","author":"Zhai"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2825986"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3105273"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_25"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2880839"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417492"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500841"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2021.3128930"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref23","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831171"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241161"},{"article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"Proc. 11th USENIX Workshop Offensive Technol.","author":"Brasser","key":"ref29"},{"article-title":"Azure announces next generation Intel SGX confidential computing VMs","year":"2021","author":"McReynolds","key":"ref30"},{"key":"ref31","first-page":"4147","article-title":"Minefield: A software-only protection for SGX enclaves against DVFS attacks","volume-title":"Proc. USENIX Secur. Symp.","author":"Kogler"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3314129"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"ref42","first-page":"1289","article-title":"ROTE: Rollback protection for trusted execution","volume-title":"Proc. 26th USENIX Conf. Secur. Symp.","author":"Matetic"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339814"}],"container-title":["IEEE Transactions on Sustainable Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7274860\/10422870\/10229172.pdf?arnumber=10229172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,12]],"date-time":"2024-02-12T19:55:44Z","timestamp":1707767744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10229172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsusc.2023.3308081","relation":{},"ISSN":["2377-3782","2377-3790"],"issn-type":[{"type":"electronic","value":"2377-3782"},{"type":"electronic","value":"2377-3790"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}