Attack intelligence research center annual threat report ? 2008 overview and 2009 pre- dictions, 2008. ,
A new efficient privacy-preserving scalar product protocol, Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, 2007. ,
Reputation Systems for Anonymous Networks, Proceedings of the 8th Privacy Enhancing Technologies Symposium, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
URL : http://www.cs.columbia.edu/~smb/papers/anonrep.pdf
Reputation management in privacyenhanced e-learning, Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network, pp.2-06, 2006. ,
Enabling Reputation-Based Trust in Privacy-Enhanced Learning Systems, Proceedings of the 9th International Conference on Intelligent Tutoring Systems, 2008. ,
DOI : 10.1007/978-3-540-69132-7_76
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, Journal of the American Society for Information Science and Technology, vol.18, issue.4, p.528537, 2006. ,
DOI : 10.1002/asi.20307
Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007. ,
DOI : 10.1145/1314333.1314339
URL : http://www.cs.brown.edu/~mira/papers/wpes07.pdf
P-signatures and Noninteractive Anonymous Credentials, Theory of Cryptography, 2008. ,
DOI : 10.1007/978-3-540-78524-8_20
A Reputation System with Privacy and Incentive, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007. ,
DOI : 10.1109/SNPD.2007.161
Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks), Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC'02), 2002. ,
A robust reputation system for peer-to-peer and mobile ad-hoc networks, Proceedings of P2PEcon, 2004. ,
An efficient system for nontransferable anonymous credentials with optional anonymity revocation, 2001. ,
DOI : 10.1007/3-540-44987-6_7
Endorsed E-Cash, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007. ,
DOI : 10.1109/SP.2007.15
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, p.8488, 1981. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf
Blind Signatures for Untraceable Payments, Proc. Advances in Cryptology (CRYPTO '82), 1982. ,
DOI : 10.1007/978-1-4757-0602-4_18
Blind Signature System, Advances in Cryptology (CRYPTO'83), 1983. ,
DOI : 10.1007/978-1-4684-4730-9_14
Tools for privacy preserving distributed data mining, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.28-34, 2003. ,
DOI : 10.1145/772862.772867
URL : http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007. ,
DOI : 10.1109/P2P.2007.15
A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586138
A Reputation System to Increase MIX-Net Reliability, Proceedings of the 4th International Workshop on Information Hiding, 2001. ,
DOI : 10.1007/3-540-45496-9_10
Tor: The secondgeneration onion router, Proceedings of the USENIX Security Symposium, 2004. ,
DOI : 10.21236/ada465464
Reputation in privacy enhancing technologies, Proceedings of the 12th annual conference on Computers, freedom and privacy , CFP '02, 2002. ,
DOI : 10.1145/543482.543507
Reputation in p2p anonymity systems, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, p.48, 2003. ,
The sybil attack, Proceedings of the First International Workshop on Peer-to-Peer Systems, 2002. ,
Duedil ? transparent, constructive feedback on your profile, 2010. ,
A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, issue.4, p.31469472, 1985. ,
A robust and knotaware trust-based reputation model, Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008. ,
Making and Breaking Cooperative Relatioins, chapter Can We Trust Trust?, pp.213-237, 2000. ,
The knowledge complexity of interactive proof systems, SIAM Journal on Computing, vol.18, issue.1, p.186208, 1989. ,
Methods for Computing Trust and Reputation While Preserving Privacy, Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2009. ,
DOI : 10.1145/359168.359176
A reputation system for peer-to-peer networks, Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video , NOSSDAV '03, 2003. ,
DOI : 10.1145/776322.776346
A Bayesian Reputation System for Virtual Organizations, Negotiation, Auctions, and Market Engineering, 2008. ,
DOI : 10.1007/978-3-540-77554-6_12
Ara: A robust audit to prevent free-riding in p2p networks, Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, 2005. ,
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments, Proceedings of the 25th IFIP International Information Security Confer- 49 ,
DOI : 10.1007/978-3-540-70630-4_13
URL : https://hal.archives-ouvertes.fr/hal-01054511
A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2007. ,
DOI : 10.1145/1592451.1592452
Lars a locally aware reputation system for mobile ad hoc networks, Proceedings of the 44th Annual Southeast Regional Conference, 2006. ,
The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, 2002. ,
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
The eigentrust algorithm for reputation management in p2p networks, Proceedings of the 12th International Conference on World Wide Web, 2003. ,
A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009. ,
DOI : 10.1145/1655188.1655197
URL : http://www.fkerschbaum.org/wpes09.pdf
A Privacy-Enhanced Peer-to-Peer Reputation System, Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, 2003. ,
DOI : 10.1007/978-3-540-45229-4_21
URL : ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2003-18/INPROC-2003-18.pdf
Strong pseudonymous communication for peer-to-peer reputation systems, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, 2005. ,
DOI : 10.1145/1066677.1067033
Attack-Resistant Trust Metrics (Chapter 5) Computing with Social Trust, 2008. ,
DOI : 10.1007/978-1-84800-356-9_5
Security threats scenarios in trust and reputation models for distributed systems, Computers & security, vol.28, pp.545-556, 2009. ,
Limited reputation sharing in P2P systems, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, 2004. ,
DOI : 10.1145/988772.988787
URL : http://ilpubs.stanford.edu:8090/588/1/2003-27.pdf
Computing Reputation for Collaborative Private Networks, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009. ,
DOI : 10.1109/COMPSAC.2009.40
The pagerank citation ranking: Bringing order to the web, 1998. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Supporting Privacy in Decentralized Additive Reputation Systems, Proceedings of the Second International Conference on Trust Management, 2004. ,
DOI : 10.1007/978-3-540-24747-0_9
Non-interactive and information-theoretic secure verifiable secret sharing, Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, 1991. ,
Multilateral secure crosscommunity reputation systems for internet communities, Proceedings of the Fifth International Conference on Trust and Privacy in Digital Business, 2008. ,
DOI : 10.1007/978-3-540-85735-8_8
Trust among strangers in internet transactions: Empirical analysis of ebay's reputation system. The Economics of the Internet and E-Commerce, of Advances in Applied Microeconomics, pp.127-157, 2002. ,
Privacy and Liveliness for Reputation Systems, Proceedings of the Sixth European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI'09), pp.209-224, 2009. ,
DOI : 10.21236/ADA465464
TrustGuard, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005. ,
DOI : 10.1145/1060745.1060808
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities, Security and Privacy in Dynamic Environments, 2006. ,
DOI : 10.1007/0-387-33406-8_11
Relating Reputation and Money in On-line Markets, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2009. ,
DOI : 10.1109/WI-IAT.2009.107
URL : http://research.microsoft.com/pubs/70546/tr-2008-23.pdf
Unvarnished ? community-contributed reviews for business professionals, 2010. ,
A Privacy Preserving Reputation System for Mobile Information Dissemination Networks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005. ,
DOI : 10.1109/SECURECOMM.2005.7
URL : http://www.ito.tu-darmstadt.de/publs/pdf/voss-Reputation.pdf
Bayesian network trust model in peerto-peer networks, Agents and Peer-to-Peer Computing, 2004. ,
DOI : 10.1007/978-3-540-25840-7_3
URL : http://p2p.ingce.unibo.it/2003/NotRevisedPapers/07_Wang.pdf
Filtering out unfair ratings in bayesian reputation systems, Proceedings of the Workshop on Trust in Agent Societies, at the Autonomous Agents and Multi Agent Systems Conference (AAMAS2004), 2004. ,
Sybilguard: Defending against sybil attacks via social networks, Proceedings of the 2006 Conference on Applications, Technologies , Architectures, and Protocols for Computer Communications (SIGCOMM'06), pp.267-278, 2006. ,
DOI : 10.1109/tnet.2008.923723
A reputation system for bittorrent peer-to-peer file-sharing networks, 2006. ,
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007. ,
DOI : 10.1109/TPDS.2007.1021
Spreading activation models for trust propagation, Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. ,