F. Cl, . Pp, and . Figure, Temps de calcul des utilisateurs pendant chaque étape d'une interaction Références [AGL + 14] Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, and Valérie Viet Triem Tong. Extending signatures of reputation, Privacy and Identity Management for Emerging Services and Technologies, pp.165-176, 2014.

J. Bethencourt, E. Shi, and D. Song, Signatures of Reputation, Financial Cryptography and Data Security (FC), pp.400-407, 2010.
DOI : 10.1007/978-3-642-14577-3_35

G. Fuchsbauer and D. Pointcheval, Anonymous Proxy Signatures, Security and Cryptography for Networks (SCN), pp.201-217, 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

O. Hasan, L. Brunie, E. Bertino, and N. Shang, A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013.
DOI : 10.1109/TIFS.2013.2258914

URL : https://hal.archives-ouvertes.fr/hal-01339185