The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, pp.41-55, 2002. ,
Distributed Reputation Management for Electronic Commerce, Computational Intelligence, vol.18, issue.4, pp.535-549, 2002. ,
DOI : 10.1111/1467-8640.00202
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.6080
Incentive-Based Robust Reputation Mechanism for P2P Services, Lecture Notes in Computer Science, vol.4305, pp.305-319, 2006. ,
DOI : 10.1007/11945529_22
URL : https://hal.archives-ouvertes.fr/inria-00121609
A privacy preserving distributed reputation mechanism, 2013 IEEE International Conference on Communications (ICC), 2013. ,
DOI : 10.1109/ICC.2013.6654809
URL : https://hal.archives-ouvertes.fr/hal-00763212
Signatures of Reputation, Lecture Notes in Computer Science, vol.6052, pp.400-407, 2010. ,
DOI : 10.1007/978-3-642-14577-3_35
Enhancing Multilateral Security in and by Reputation Systems, of IFIP Advances in Information and Communication Technology, pp.135-150, 2008. ,
DOI : 10.1016/S1389-1286(00)00029-3
A terminology for talking about privacy by data minimization, pp.0-34, 2010. ,
Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies, pp.202-218, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
Trust among strangers in internet transactions: Empirical analysis of ebay's reputation system Advances in applied microeconomics, pp.11-127, 2002. ,
Supporting Privacy in Decentralized Additive Reputation Systems, Lecture Notes in Computer Science, vol.2995, pp.108-119, 2004. ,
DOI : 10.1007/978-3-540-24747-0_9
Efficient Non-interactive Proof Systems for Bilinear Groups, Lecture Notes in Computer Science, vol.4965, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Tor: The second-generation onion router, USENIX Security Symposium, USENIX, pp.303-320, 2004. ,
Anonymous Proxy Signatures, Lecture Notes in Computer Science, vol.5229, pp.201-217, 2008. ,
DOI : 10.1007/978-3-540-85855-3_14
URL : https://hal.archives-ouvertes.fr/inria-00419153
A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987. ,
DOI : 10.1109/SFCS.1987.4