
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Virtual currency and reputation-based cooperation incentives in user-centric networks
Alessandro Bogliolo, Paolo Polidori, Alessandro Aldini, et al.
(2012), pp. 895-900
Closed Access | Times Cited: 51
Alessandro Bogliolo, Paolo Polidori, Alessandro Aldini, et al.
(2012), pp. 895-900
Closed Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
Yunhua He, Hong Li, Xiuzhen Cheng, et al.
IEEE Access (2018) Vol. 6, pp. 27324-27335
Open Access | Times Cited: 179
Yunhua He, Hong Li, Xiuzhen Cheng, et al.
IEEE Access (2018) Vol. 6, pp. 27324-27335
Open Access | Times Cited: 179
Incentive mechanisms for user-provided networks
George Iosifidis, Lin Gao, Jianwei Huang, et al.
IEEE Communications Magazine (2014) Vol. 52, Iss. 9, pp. 20-27
Closed Access | Times Cited: 68
George Iosifidis, Lin Gao, Jianwei Huang, et al.
IEEE Communications Magazine (2014) Vol. 52, Iss. 9, pp. 20-27
Closed Access | Times Cited: 68
Scalable framework for blockchain-based shared manufacturing
Nejc Rožman, Janez Diaci, Marko Corn
Robotics and Computer-Integrated Manufacturing (2021) Vol. 71, pp. 102139-102139
Open Access | Times Cited: 53
Nejc Rožman, Janez Diaci, Marko Corn
Robotics and Computer-Integrated Manufacturing (2021) Vol. 71, pp. 102139-102139
Open Access | Times Cited: 53
Bitcoin Mining Technology
Nirupama Devi Bhaskar, David Lee Kuo Chuen
Elsevier eBooks (2015), pp. 45-65
Closed Access | Times Cited: 62
Nirupama Devi Bhaskar, David Lee Kuo Chuen
Elsevier eBooks (2015), pp. 45-65
Closed Access | Times Cited: 62
A new cluster P2P file sharing system based on IPFS and blockchain technology
S. Vimal, S. K. Srivatsa
Journal of Ambient Intelligence and Humanized Computing (2019)
Closed Access | Times Cited: 53
S. Vimal, S. K. Srivatsa
Journal of Ambient Intelligence and Humanized Computing (2019)
Closed Access | Times Cited: 53
Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions
Dalhatu Muhammed, Mohammad Hossein Anisi, Mahdi Zareei, et al.
Sensors (2018) Vol. 18, Iss. 2, pp. 425-425
Open Access | Times Cited: 45
Dalhatu Muhammed, Mohammad Hossein Anisi, Mahdi Zareei, et al.
Sensors (2018) Vol. 18, Iss. 2, pp. 425-425
Open Access | Times Cited: 45
Rewarding reviews with tokens: An Ethereum-based approach
Andrea Lisi, Andrea De Salve, Paolo Mori, et al.
Future Generation Computer Systems (2021) Vol. 120, pp. 36-54
Open Access | Times Cited: 29
Andrea Lisi, Andrea De Salve, Paolo Mori, et al.
Future Generation Computer Systems (2021) Vol. 120, pp. 36-54
Open Access | Times Cited: 29
Blockchain incentivized data forwarding in MANETs: Strategies and challenges
Caciano dos Santos Machado, Carla Merkle Westphall
Ad Hoc Networks (2020) Vol. 110, pp. 102321-102321
Closed Access | Times Cited: 30
Caciano dos Santos Machado, Carla Merkle Westphall
Ad Hoc Networks (2020) Vol. 110, pp. 102321-102321
Closed Access | Times Cited: 30
Analysis of hybrid relaying in cooperative WLAN
Tauseef Jamal, Paulo Mendes, André Zúquete
(2013), pp. 1-6
Closed Access | Times Cited: 34
Tauseef Jamal, Paulo Mendes, André Zúquete
(2013), pp. 1-6
Closed Access | Times Cited: 34
Automatic Verification of Competitive Stochastic Systems
Taolue Chen, Vojtěch Forejt, Marta Kwiatkowska, et al.
Lecture notes in computer science (2012), pp. 315-330
Open Access | Times Cited: 34
Taolue Chen, Vojtěch Forejt, Marta Kwiatkowska, et al.
Lecture notes in computer science (2012), pp. 315-330
Open Access | Times Cited: 34
Cooperative Strategies for Challenged Networks and Applications: A Survey
Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, et al.
IEEE Systems Journal (2015) Vol. 11, Iss. 4, pp. 2749-2760
Closed Access | Times Cited: 30
Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, et al.
IEEE Systems Journal (2015) Vol. 11, Iss. 4, pp. 2749-2760
Closed Access | Times Cited: 30
Detection of repackaged mobile applications through a collaborative approach
Alessandro Aldini, Fabio Martinelli, Andrea Saracino, et al.
Concurrency and Computation Practice and Experience (2014) Vol. 27, Iss. 11, pp. 2818-2838
Closed Access | Times Cited: 26
Alessandro Aldini, Fabio Martinelli, Andrea Saracino, et al.
Concurrency and Computation Practice and Experience (2014) Vol. 27, Iss. 11, pp. 2818-2838
Closed Access | Times Cited: 26
Swarm Economy: A Model for Transactions in a Distributed and Organic IoT Platform
Laisa C. P. Costa, Pablo C. Calcina-Ccori, Geovane Fedrecheski, et al.
IEEE Internet of Things Journal (2018) Vol. 6, Iss. 3, pp. 4561-4572
Closed Access | Times Cited: 23
Laisa C. P. Costa, Pablo C. Calcina-Ccori, Geovane Fedrecheski, et al.
IEEE Internet of Things Journal (2018) Vol. 6, Iss. 3, pp. 4561-4572
Closed Access | Times Cited: 23
Representation of Trust and Reputation in Self-Managed Computing Systems
Jan Kantert, Sarah Edenhofer, Sven Tomforde, et al.
(2015) Vol. 5, pp. 1827-1834
Closed Access | Times Cited: 20
Jan Kantert, Sarah Edenhofer, Sven Tomforde, et al.
(2015) Vol. 5, pp. 1827-1834
Closed Access | Times Cited: 20
The influence of platform incentives on actual carriers’ continuous participation intention of non-vehicle operating carrier platform
Liang Xiao, Tongping Ke
Asia Pacific Journal of Marketing and Logistics (2019) Vol. 31, Iss. 5, pp. 1269-1286
Closed Access | Times Cited: 19
Liang Xiao, Tongping Ke
Asia Pacific Journal of Marketing and Logistics (2019) Vol. 31, Iss. 5, pp. 1269-1286
Closed Access | Times Cited: 19
Cooperative Networking in User-Centric Wireless Networks
Paulo Mendes, Waldir Moreira, Tauseef Jamal, et al.
Lecture notes in social networks (2014), pp. 135-157
Closed Access | Times Cited: 17
Paulo Mendes, Waldir Moreira, Tauseef Jamal, et al.
Lecture notes in social networks (2014), pp. 135-157
Closed Access | Times Cited: 17
Modeling and verification of trust and reputation systems
Alessandro Aldini
Security and Communication Networks (2015) Vol. 8, Iss. 16, pp. 2933-2946
Closed Access | Times Cited: 16
Alessandro Aldini
Security and Communication Networks (2015) Vol. 8, Iss. 16, pp. 2933-2946
Closed Access | Times Cited: 16
Joint design of device to device caching strategy and incentive scheme in mobile edge networks
Shuo Wang, Xing Zhang, Lin Wang, et al.
IET Communications (2018) Vol. 12, Iss. 14, pp. 1728-1736
Closed Access | Times Cited: 15
Shuo Wang, Xing Zhang, Lin Wang, et al.
IET Communications (2018) Vol. 12, Iss. 14, pp. 1728-1736
Closed Access | Times Cited: 15
Cooperative Relaying for Wireless Local Area Networks
Tauseef Jamal, Paulo Mendes
Lecture notes in computer science (2014), pp. 50-69
Closed Access | Times Cited: 14
Tauseef Jamal, Paulo Mendes
Lecture notes in computer science (2014), pp. 50-69
Closed Access | Times Cited: 14
Strategic Analysis of Trust Models for User-Centric Networks
Marta Kwiatkowska, David Parker, Aistis Simaitis
arXiv (Cornell University) (2013) Vol. 112, pp. 53-59
Open Access | Times Cited: 12
Marta Kwiatkowska, David Parker, Aistis Simaitis
arXiv (Cornell University) (2013) Vol. 112, pp. 53-59
Open Access | Times Cited: 12
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications
Alessandro Aldini, Alessandro Bogliolo
Advances in information security, privacy, and ethics book series (2013), pp. 432-461
Closed Access | Times Cited: 10
Alessandro Aldini, Alessandro Bogliolo
Advances in information security, privacy, and ethics book series (2013), pp. 432-461
Closed Access | Times Cited: 10
A cross-chain rating system: bridging EVM-based blockchains with Chainbridge
Andrea Lisi, Nunzio Lopardo, Domenico Tortola, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 3
Andrea Lisi, Nunzio Lopardo, Domenico Tortola, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 3
Cooperation incentives based load balancing in UCN: A probabilistic approach
Mürsel Yildiz, Manzoor Ahmed Khan, Fikret Sivrikaya, et al.
2015 IEEE Global Communications Conference (GLOBECOM) (2012), pp. 2746-2752
Closed Access | Times Cited: 8
Mürsel Yildiz, Manzoor Ahmed Khan, Fikret Sivrikaya, et al.
2015 IEEE Global Communications Conference (GLOBECOM) (2012), pp. 2746-2752
Closed Access | Times Cited: 8
Design and Analysis of Incentive Mechanism for Ethereum-based Supply Chain Management Systems
S.A. Pranesh, Vignesh Kannan V., N. Viswanathan, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2020), pp. 1-6
Closed Access | Times Cited: 8
S.A. Pranesh, Vignesh Kannan V., N. Viswanathan, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2020), pp. 1-6
Closed Access | Times Cited: 8
Multi-hop data dissemination with selfish nodes: Optimal decision and fair cost allocation based on the Shapley value
Mahdi Mousavi, Sabrina Klos, Hussein Al-Shatri, et al.
(2016) Vol. 28, pp. 1-6
Closed Access | Times Cited: 7
Mahdi Mousavi, Sabrina Klos, Hussein Al-Shatri, et al.
(2016) Vol. 28, pp. 1-6
Closed Access | Times Cited: 7