{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:22:54Z","timestamp":1775323374418,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2976755","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1859-1860","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Introduction to Credit Networks"],"prefix":"10.1145","author":[{"given":"Aniket","family":"Kate","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ripple website. https:\/\/ripple.com\/.  Ripple website. https:\/\/ripple.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Stellar website. https:\/\/www.stellar.org\/.  Stellar website. https:\/\/www.stellar.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.98"},{"key":"e_1_3_2_1_4_1","volume-title":"Money as IOUs in Social Trust Networks & A Proposal for a Decentralized Currency Network Protocol","author":"Fugger R.","year":"2004","unstructured":"Fugger , R. Money as IOUs in Social Trust Networks & A Proposal for a Decentralized Currency Network Protocol , 2004 . Fugger, R. Money as IOUs in Social Trust Networks & A Proposal for a Decentralized Currency Network Protocol, 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"Ghosh A. Mahdian M. Reeves D. M. Pennock D. M. and Fugger R. Mechanism Design on Trust Networks. In WINE'07.   Ghosh A. Mahdian M. Reeves D. M. Pennock D. M. and Fugger R. Mechanism Design on Trust Networks. In WINE'07."},{"key":"e_1_3_2_1_6_1","unstructured":"Holley E. Earthport launches distributed ledger hub via Ripple. http:\/\/www.bankingtech.com\/420912\/earthport-launches-distributed-ledger-hub-via-ripple\/.  Holley E. Earthport launches distributed ledger hub via Ripple. http:\/\/www.bankingtech.com\/420912\/earthport-launches-distributed-ledger-hub-via-ripple\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Silentwhispers: Enforcing security and privacy in credit networks","author":"Kate A.","year":"2016","unstructured":"Kate , A. , Maffei , M. , Malavolta , G. , and Moreno-Sanchez , P. Silentwhispers: Enforcing security and privacy in credit networks , 2016 . http:\/\/crypsys.mmci.uni-saarland.de\/projects\/DecentralizedPrivPay\/. Kate, A., Maffei, M., Malavolta, G., and Moreno-Sanchez, P. Silentwhispers: Enforcing security and privacy in credit networks, 2016. http:\/\/crypsys.mmci.uni-saarland.de\/projects\/DecentralizedPrivPay\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Liu A. Implementing the interledger protocol in ripple. https:\/\/ripple.com\/insights\/implementing-the-interledger-protocol\/.  Liu A. Implementing the interledger protocol in ripple. https:\/\/ripple.com\/insights\/implementing-the-interledger-protocol\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Ripple Labs Signs First Two US Banks. https:\/\/ripple.com\/ripple-labs-signs-first-two-us-banks\/","author":"Liu A.","year":"2014","unstructured":"Liu , A. Ripple Labs Signs First Two US Banks. https:\/\/ripple.com\/ripple-labs-signs-first-two-us-banks\/ , 2014 . Liu, A. Ripple Labs Signs First Two US Banks. https:\/\/ripple.com\/ripple-labs-signs-first-two-us-banks\/, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"Santander: Distributed Ledger Tech Could Save Banks$20 Billion a Year. https:\/\/ripple.com\/blog\/santander-distributed-ledger-tech-could-save-banks-20-billion-a-year\/","author":"Liu A.","year":"2015","unstructured":"Liu , A. Santander: Distributed Ledger Tech Could Save Banks$20 Billion a Year. https:\/\/ripple.com\/blog\/santander-distributed-ledger-tech-could-save-banks-20-billion-a-year\/ , 2015 . Liu, A. Santander: Distributed Ledger Tech Could Save Banks$20 Billion a Year. https:\/\/ripple.com\/blog\/santander-distributed-ledger-tech-could-save-banks-20-billion-a-year\/, 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"NSDI'08","author":"Mislove A.","unstructured":"Mislove , A. , Post , A. , Druschel , P. , and Gummadi , K. P . Ostra: Leveraging Trust to Thwart Unwanted Communication . In NSDI'08 . Mislove, A., Post, A., Druschel, P., and Gummadi, K. P. Ostra: Leveraging Trust to Thwart Unwanted Communication. In NSDI'08."},{"key":"e_1_3_2_1_12_1","volume-title":"INFOCOM'11","author":"Mohaisen A.","unstructured":"Mohaisen , A. , Hopper , N. , and Kim , Y . Keep your friends close: Incorporating trust into social network-based Sybil defenses . In INFOCOM'11 . Mohaisen, A., Hopper, N., and Kim, Y. Keep your friends close: Incorporating trust into social network-based Sybil defenses. In INFOCOM'11."},{"key":"e_1_3_2_1_13_1","volume-title":"NDSS'15","author":"Moreno-Sanchez P.","unstructured":"Moreno-Sanchez , P. , Kate , A. , Maffei , M. , and Pecina , K . Privacy preserving payments in credit networks: Enabling trust with privacy in online marketplaces . In NDSS'15 . Moreno-Sanchez, P., Kate, A., Maffei, M., and Pecina, K. Privacy preserving payments in credit networks: Enabling trust with privacy in online marketplaces. In NDSS'15."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1515\/popets-2016-0049","volume":"2016","author":"Moreno-Sanchez P.","year":"2016","unstructured":"Moreno-Sanchez , P. , Zafar , M. B. , and Kate , A. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network. PoPETS 2016 , 4 ( 2016 ), 436--453. Moreno-Sanchez, P., Zafar, M. B., and Kate, A. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network. PoPETS 2016, 4 (2016), 436--453.","journal-title":"PoPETS"},{"key":"e_1_3_2_1_15_1","unstructured":"Poon J. and Dryja T. The bitcoin lightning network. https:\/\/lightning.network.  Poon J. and Dryja T. The bitcoin lightning network. https:\/\/lightning.network."},{"key":"e_1_3_2_1_16_1","volume-title":"Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI'11","author":"Post A.","unstructured":"Post , A. , Shah , V. , and Mislove , A . Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI'11 . Post, A., Shah, V., and Mislove, A. Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI'11."},{"key":"e_1_3_2_1_17_1","unstructured":"Rizzo P. Fidor Becomes First Bank to Use Ripple Payment Protocol. http:\/\/www.coindesk.com\/fidor-becomes-first-bank-to-use-ripple-payment-protocol\/.  Rizzo P. Fidor Becomes First Bank to Use Ripple Payment Protocol. http:\/\/www.coindesk.com\/fidor-becomes-first-bank-to-use-ripple-payment-protocol\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Rizzo P. Japan's SBI Holdings Teams With Ripple to Launch New Company. http:\/\/www.coindesk.com\/sbi-holdings-ripple-new-company\/.  Rizzo P. Japan's SBI Holdings Teams With Ripple to Launch New Company. http:\/\/www.coindesk.com\/sbi-holdings-ripple-new-company\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Thomas S. and Schwartz E. A Protocol for Interledger Payments.  Thomas S. and Schwartz E. A Protocol for Interledger Payments."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2976755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2976755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2976755"}},"subtitle":["Security, Privacy, and Applications"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":19,"alternative-id":["10.1145\/2976749.2976755","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2976755","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}