Research Article
IOV Privacy Protection System Based on Double-Layered Chains
Algorithm 6
Information dissemination.
INPUT: | OUTPUT: | 1: function | 2: | 3: | 4: | 5: | 6:if is valid then | 7: | 8: | 9: | 10:else | 11:return | 12:end if | 13:if is valid then | 14:if is valid then | 15:A gets reward for TA | 16:else | 17:A gives loss to TA | 18:end if | 19:else | 20:return | 21:end if | 22: end function |
|