A. Knowledge and S. Ltd, Attack intelligence research center annual threat report ? 2008 overview and 2009 pre- dictions, 2008.

A. Amirbekyan and V. Estivill-castro, A new efficient privacy-preserving scalar product protocol, Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, 2007.

E. Androulaki, S. M. Choi, T. Bellovin, and . Malkin, Reputation Systems for Anonymous Networks, Proceedings of the 8th Privacy Enhancing Technologies Symposium, 2008.
DOI : 10.1007/978-3-540-70630-4_13

URL : http://www.cs.columbia.edu/~smb/papers/anonrep.pdf

M. Anwar and J. Greer, Reputation management in privacyenhanced e-learning, Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network, pp.2-06, 2006.

M. Anwar and J. Greer, Enabling Reputation-Based Trust in Privacy-Enhanced Learning Systems, Proceedings of the 9th International Conference on Intelligent Tutoring Systems, 2008.
DOI : 10.1007/978-3-540-69132-7_76

R. Aringhieri, E. Damiani, S. De-capitani, D. Vimercati, S. Paraboschi et al., Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, Journal of the American Society for Information Science and Technology, vol.18, issue.4, p.528537, 2006.
DOI : 10.1002/asi.20307

M. Belenkiy, M. Chase, C. C. Erway, J. Jannotti, A. Kupcu et al., Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007.
DOI : 10.1145/1314333.1314339

URL : http://www.cs.brown.edu/~mira/papers/wpes07.pdf

M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, P-signatures and Noninteractive Anonymous Credentials, Theory of Cryptography, 2008.
DOI : 10.1007/978-3-540-78524-8_20

Y. Bo, Z. Min, and L. Guohuan, A Reputation System with Privacy and Incentive, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007.
DOI : 10.1109/SNPD.2007.161

S. Buchegger and J. Boudec, Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks), Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC'02), 2002.

S. Buchegger and J. Boudec, A robust reputation system for peer-to-peer and mobile ad-hoc networks, Proceedings of P2PEcon, 2004.

J. Camenisch and A. Lysyanskaya, An efficient system for nontransferable anonymous credentials with optional anonymity revocation, 2001.
DOI : 10.1007/3-540-44987-6_7

J. Camenisch, A. Lysyanskaya, and M. Meyerovich, Endorsed E-Cash, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.15

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, p.8488, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

D. Chaum, Blind Signatures for Untraceable Payments, Proc. Advances in Cryptology (CRYPTO '82), 1982.
DOI : 10.1007/978-1-4757-0602-4_18

D. Chaum, Blind Signature System, Advances in Cryptology (CRYPTO'83), 1983.
DOI : 10.1007/978-1-4684-4730-9_14

C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, Tools for privacy preserving distributed data mining, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.28-34, 2003.
DOI : 10.1145/772862.772867

URL : http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf

C. Costa and J. Almeida, Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007.
DOI : 10.1109/P2P.2007.15

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, P. Samarati, and F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586138

R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar, A Reputation System to Increase MIX-Net Reliability, Proceedings of the 4th International Workshop on Information Hiding, 2001.
DOI : 10.1007/3-540-45496-9_10

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The secondgeneration onion router, Proceedings of the USENIX Security Symposium, 2004.
DOI : 10.21236/ada465464

R. Dingledine, N. Mathewson, and P. Syverson, Reputation in privacy enhancing technologies, Proceedings of the 12th annual conference on Computers, freedom and privacy , CFP '02, 2002.
DOI : 10.1145/543482.543507

R. Dingledine, N. Mathewson, and P. Syverson, Reputation in p2p anonymity systems, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, p.48, 2003.

R. John and . Douceur, The sybil attack, Proceedings of the First International Workshop on Peer-to-Peer Systems, 2002.

. Duedil, Duedil ? transparent, constructive feedback on your profile, 2010.

T. Elgamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, issue.4, p.31469472, 1985.

N. Gal-oz, E. Gudes, and D. Hendler, A robust and knotaware trust-based reputation model, Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008.

D. Gambetta and . Trust, Making and Breaking Cooperative Relatioins, chapter Can We Trust Trust?, pp.213-237, 2000.

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM Journal on Computing, vol.18, issue.1, p.186208, 1989.

E. Gudes, N. Gal-oz, and A. Grubshtein, Methods for Computing Trust and Reputation While Preserving Privacy, Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2009.
DOI : 10.1145/359168.359176

M. Gupta, P. Judge, and M. Ammar, A reputation system for peer-to-peer networks, Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video , NOSSDAV '03, 2003.
DOI : 10.1145/776322.776346

J. Haller, A Bayesian Reputation System for Virtual Organizations, Negotiation, Auctions, and Market Engineering, 2008.
DOI : 10.1007/978-3-540-77554-6_12

M. Ham and G. Agha, Ara: A robust audit to prevent free-riding in p2p networks, Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, 2005.

O. Hasan, L. Brunie, and E. Bertino, k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments, Proceedings of the 25th IFIP International Information Security Confer- 49
DOI : 10.1007/978-3-540-70630-4_13

URL : https://hal.archives-ouvertes.fr/hal-01054511

K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2007.
DOI : 10.1145/1592451.1592452

J. Hu and M. Burmester, Lars a locally aware reputation system for mobile ad hoc networks, Proceedings of the 44th Annual Southeast Regional Conference, 2006.

A. Josang and R. Ismail, The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, 2002.

A. Josang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

D. Sepandar, M. T. Kamvar, H. Schlosser, and . Garciamolina, The eigentrust algorithm for reputation management in p2p networks, Proceedings of the 12th International Conference on World Wide Web, 2003.

F. Kerschbaum, A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655197

URL : http://www.fkerschbaum.org/wpes09.pdf

M. Kinateder and S. Pearson, A Privacy-Enhanced Peer-to-Peer Reputation System, Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, 2003.
DOI : 10.1007/978-3-540-45229-4_21

URL : ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2003-18/INPROC-2003-18.pdf

M. Kinateder, R. Terdic, and K. Rothermel, Strong pseudonymous communication for peer-to-peer reputation systems, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, 2005.
DOI : 10.1145/1066677.1067033

R. Levien, Attack-Resistant Trust Metrics (Chapter 5) Computing with Social Trust, 2008.
DOI : 10.1007/978-1-84800-356-9_5

F. Gomez, M. , and G. Perez, Security threats scenarios in trust and reputation models for distributed systems, Computers & security, vol.28, pp.545-556, 2009.

S. Marti and H. Garcia-molina, Limited reputation sharing in P2P systems, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, 2004.
DOI : 10.1145/988772.988787

URL : http://ilpubs.stanford.edu:8090/588/1/2003-27.pdf

J. Nin, B. Carminati, E. Ferrari, and V. Torra, Computing Reputation for Collaborative Private Networks, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009.
DOI : 10.1109/COMPSAC.2009.40

L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web, 1998.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, 1999.
DOI : 10.1007/3-540-48910-X_16

E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, Proceedings of the Second International Conference on Trust Management, 2004.
DOI : 10.1007/978-3-540-24747-0_9

P. Torben and . Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, 1991.

F. Pingel and S. Steinbrecher, Multilateral secure crosscommunity reputation systems for internet communities, Proceedings of the Fifth International Conference on Trust and Privacy in Digital Business, 2008.
DOI : 10.1007/978-3-540-85735-8_8

P. Resnick and R. Zeckhauser, Trust among strangers in internet transactions: Empirical analysis of ebay's reputation system. The Economics of the Internet and E-Commerce, of Advances in Applied Microeconomics, pp.127-157, 2002.

S. Schiffner, S. Clau, and S. Steinbrecher, Privacy and Liveliness for Reputation Systems, Proceedings of the Sixth European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI'09), pp.209-224, 2009.
DOI : 10.21236/ADA465464

M. Srivatsa, L. Xiong, and L. Liu, TrustGuard, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005.
DOI : 10.1145/1060745.1060808

S. Steinbrecher, Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities, Security and Privacy in Dynamic Environments, 2006.
DOI : 10.1007/0-387-33406-8_11

A. Swaminathan, R. G. Cattelan, C. V. Mathew, Y. Wexler, and D. Kirovski, Relating Reputation and Money in On-line Markets, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2009.
DOI : 10.1109/WI-IAT.2009.107

URL : http://research.microsoft.com/pubs/70546/tr-2008-23.pdf

. Unvarnished, Unvarnished ? community-contributed reviews for business professionals, 2010.

M. Voss, A. Heinemann, and M. Muhlhauser, A Privacy Preserving Reputation System for Mobile Information Dissemination Networks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005.
DOI : 10.1109/SECURECOMM.2005.7

URL : http://www.ito.tu-darmstadt.de/publs/pdf/voss-Reputation.pdf

Y. Wang and J. Vassileva, Bayesian network trust model in peerto-peer networks, Agents and Peer-to-Peer Computing, 2004.
DOI : 10.1007/978-3-540-25840-7_3

URL : http://p2p.ingce.unibo.it/2003/NotRevisedPapers/07_Wang.pdf

A. Whitby, A. Josang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, Proceedings of the Workshop on Trust in Agent Societies, at the Autonomous Agents and Multi Agent Systems Conference (AAMAS2004), 2004.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, Sybilguard: Defending against sybil attacks via social networks, Proceedings of the 2006 Conference on Applications, Technologies , Architectures, and Protocols for Computer Communications (SIGCOMM'06), pp.267-278, 2006.
DOI : 10.1109/tnet.2008.923723

L. Yu, A reputation system for bittorrent peer-to-peer file-sharing networks, 2006.

R. Zhou and K. Hwang, PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007.
DOI : 10.1109/TPDS.2007.1021

N. Cai, G. Ziegler, and . Lausen, Spreading activation models for trust propagation, Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004.