Structure-preserving signatures and commitments to group elements, Advances in Cryptology?CRYPTO, pp.209-236, 2010. ,
Charm: a framework for rapidly prototyping cryptosystems, Journal of Cryptographic Engineering, vol.38, issue.3, pp.111-128, 2013. ,
DOI : 10.1007/s13389-013-0057-3
Incentive-Based Robust Reputation Mechanism for P2P Services, International Conference on Principles of Distributed Systems (OPODIS), pp.305-319, 2006. ,
DOI : 10.1007/11945529_22
URL : https://hal.archives-ouvertes.fr/inria-00121609
Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies, pp.202-218, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
Faster Explicit Formulas for Computing Pairings over Ordinary Curves, Eurocrypt, pp.48-68, 2011. ,
DOI : 10.1007/978-3-642-20465-4_5
Bad is stronger than good., Review of General Psychology, vol.5, issue.4, pp.323-370, 2001. ,
DOI : 10.1037/1089-2680.5.4.323
Signatures of Reputation, Financial Cryptography and Data Security, pp.400-407, 2010. ,
DOI : 10.1007/978-3-642-14577-3_35
Batch Groth???Sahai, Applied Cryptography and Network Security (ACNS), 2010. ,
DOI : 10.1007/978-3-642-13708-2_14
URL : https://hal.archives-ouvertes.fr/inria-00577167
Computational Puzzles as Sybil Defenses, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.171-176, 2006. ,
DOI : 10.1109/P2P.2006.10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.1170
Efficient group signature schemes for large groups (extended abstract), Advances in Cryptology?CRYPTO, pp.410-424, 1997. ,
k-anonymous reputation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.359-368, 2013. ,
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, Proceedings of the 2nd ACM conference on Electronic commerce , EC '00, pp.150-157, 2000. ,
DOI : 10.1145/352871.352889
Tor: The secondgeneration onion router, USENIX Security Symposium, pp.303-320, 2004. ,
A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987. ,
DOI : 10.1109/SFCS.1987.4
Anonymous Proxy Signatures, Security and Cryptography for Networks, pp.201-217, 2008. ,
DOI : 10.1007/978-3-540-85855-3_14
URL : https://hal.archives-ouvertes.fr/inria-00419153
Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Report on trust and reputation models, European Network and Information Security Agency (ENISA), 2011. ,
Preserving privacy of feedback providers in decentralized reputation systems, Computers & Security, vol.31, issue.7, pp.31816-826, 2012. ,
DOI : 10.1016/j.cose.2011.12.003
URL : https://hal.archives-ouvertes.fr/hal-01352961
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013. ,
DOI : 10.1109/TIFS.2013.2258914
URL : https://hal.archives-ouvertes.fr/hal-01339185
The beta reputation system, Bled Electronic Commerce Conference, 2002. ,
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.61-70, 2009. ,
DOI : 10.1145/1655188.1655197
Reputation systems and data protection law, eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp.180-187, 2004. ,
Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006. ,
DOI : 10.1016/j.comnet.2005.07.011
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
Supporting Privacy in Decentralized Additive Reputation Systems, Trust Management, pp.108-119, 2004. ,
DOI : 10.1007/978-3-540-24747-0_9
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management ,
Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. The Economics of the Internet and E-Commerce, pp.127-157, 2002. ,
Enhancing multilateral security in and by reputation systems The Future of Identity in the Information Society, pp.135-150, 2008. ,
Filtering out unfair ratings in bayesian reputation systems, Proceedings of the 7th International Workshop on Trust in Agent Societies, 2004. ,
Distributed Reputation Management for Electronic Commerce, Computational Intelligence, vol.18, issue.4, pp.535-549, 2002. ,
DOI : 10.1111/1467-8640.00202