D. G. Feng, M. Zhang, and H. Li, Big data security and privacy protection, Chin. J. Comput., vol. 37, no. 1, pp. 246-258, 2014.
X. L. Xu, X. Y. Zhang, H. H. Gao, Y. Xue, L. Y. Qi, and W. C. Dou, BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing, IEEE Trans. Ind. Informatics, vol. 16, no. 6, pp. 4187-4195, 2020.
H. W. Liu, H. Z. Kou, C. Yan, and L. Y. Qi, Keywords-driven and popularity-aware paper recommendation based on undirected paper citation graph, Complexity, vol. 2020, p. 2085638, 2020.
S. Matsumoto, and R. M. Reischuk, IKP: Turning a PKI around with decentralized automated incentives, in Proc. 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, pp. 410-426, 2017.
Z. X. Chen, L. S. Ge, H. Y. Wang, X. Z. Huang, and J. J. Lin, A trust-based service evaluation and selection model in pervasive computing environment, in Proc. 2006 1st Int. Symp. on Pervasive Computing and Applications, .
H. Zhang, Y. Wang, and X. Zhang, A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments, in Proc. 2012 5th IEEE Int. Conf. on Service-Oriented Computing and Applications (SOCA), Taipei, China, .
L. Li, Trust evaluation in service-oriented environments, PhD dissertation, Macquarie University, Sydney, Australia, 2011, pp. 217-226.
D. F. Liu, Y. Su, H. A. Xie, and K. Yang, Customer evaluation based trust model in cloud service, (in Chinese), Appl. Electronic Tech., vol. 42, no. 9, pp. 99-102, 2016.
Y. B. Wang, J. H. Wen, X. B. Wang, and W. Zhou, Cloud service evaluation model based on trust and privacy-aware, Optik, vol. 134, pp. 269-279, 2017.
S. Shunmuganathan, R. D. Saravanan, and Y. Palanichamy, Secure and efficient smart-card-based remote user authentication scheme for multiserver environment, Can. J. Electrical Comput. Eng., vol. 38, no.1, pp. 20-30, 2015.
Z. P. Hu, W. P. Ding, Z. Gao, X. H. Zhu, and J. H. Wang, Multi-stage cascade wireless security authentication scheme based on blockchain technology, (in Chinese), Comput. Sci., vol. 46, no.12, pp. 180-185, 2019.
A. Nash, W. Duane, and C. Joseph, PKI: Implementing and Managing E-security, New York, NY, USA: Mc Graw-Hill, Inc., 2001.
Y. L. Chen, Y. J. Du, and G. Yang, Efficient attribute-based authenticated key agreement protocol, (in Chinese), Comput. Sci., vol. 41, no. 4, pp. 150-154, 177, 2014.
Z. C. Zhou, L. X. Li, S. Guo, and Z. H. Li, Biometric and password two-factor cross domain authentication scheme based on blockchain technology, (in Chinese), J. Comput. Appl., vol. 38, no. 6, pp. 1620-1627, 2018.
J. L. Fan, J. M. Chen, Y. Du, P. Wang, and Y. X. Sun, DelQue: A socially aware delegation query scheme in delay-tolerant networks, IEEE Trans. Vehicular Technol., vol. 60, no. 5, pp. 2181-2193, 2011.
X. H. Liang, X. D. Lin, and X. S. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 310-320, 2013.
S. Raju, S. Boddepalli, S. Gampa, Q. B. Yan, and J. S. Deogun, Identity management using blockchain for cognitive cellular networks, in Proc. 2017 IEEE Int. Conf. on Communications (ICC), Paris, France, .
H. Wang, S. L. Ma, H. N. Dai, M. Imran, and T. S. Wang, Blockchain-based data privacy management with nudge theory in open banking, Future Generation Computer Systems, vol. 110, pp. 812-823, 2020.
X. Liang, X. Li, R. X. Lu, X. Lin, and X. Shen, Seer: A secure and efficient service review system for service-oriented mobile social networks, in Proc. 2012 IEEE 32nd Int. Conf. on Distributed Computing Systems, Macau, China, 2012, pp. 647-656.
P. L. Zheng, Z. B. Zheng, J. J. Wu, and H. N. Dai, XBlock-ETH: Extracting and exploring blockchain data from ethereum, IEEE Open J. Comput. Soc., vol. 1, pp. 95-106, 2020.
W. Wang, J. J. Song, G. Q. Xu, Y. D. Li, H. Wang, and C. H. Su, ContractWard: Automated vulnerability detection models for ethereum smart contracts, IEEE Trans. Netw. Sci. Eng., .
C. Fromknecht, D. Velicanu, and S. Yakoubov, CertCoin: A Namecoin Based Decentralized Authentication System 6.857 Class Project, Cambridge, MA, USA: Massachusetts Institute of Technology, 2014.
M. A. Wright, An overview of PKI, Network Security, vol. 1999, no. 9, pp.14-17, 1999.
A. S. Konoplev, A. G. Busygin, and D. P. Zegzhda, A blockchain decentralized public key infrastructure model, Automatic Control and Computer Sciences, vol. 52, no. 8, pp. 1017-1021, 2018.