References

References

ECDSA encryption

https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/Levy.pdf http://static.ijcsce.org/wp-content/uploads/2013/06/IJCSCESI045113.pdf https://www.websecurity.symantec.com/content/dam/websitesecurity/digitalassets/desktop/pdfs/whitepaper/Elliptic_ Curve_Cryptography_ECC_WP_en_us.pdf

Plagiarism detection:

http://ceur-ws.org/Vol-502/paper9.pdf http://ceur-ws.org/Vol-1178/CLEF2012wn-PAN-KuppersEt2012.pdf

DPoS

http://docs.bitshares.org/bitshares/dpos.html https://steemit.com/dpos/@dantheman/dpos-consensus-algorithm-this-missing-white-paper

Reputation system and spam detection: https:// nlp.stanford.edu/pubs/eigentrust.pdf

https: //dl.acm.org/citation.cf m?id=1963240 https://www.cs.uic.edu/~liub/publications/cikm-2010-final-spam.pdf

Advertising pricing model:

http://www.benedelman.org/publications/gsp-060801.pdf https://www.cs.cmu.edu/~sandholm/cs15-892F11/gsp051003.pdf

RBAC

http://www.cs.unibo.it/~montreso/master/materiale/ac/rbac.pdf

Channel management systems:

https://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?httpsredir=1&article=3598&context=thesesdissertations https://www.webrezpro.com/whitepaper/2012_02_16-PMS.pdf

‚Äč