Reputation Systems for Anonymous Networks, Proceedings of the 8th International Symposium on Privacy Enhancing Technologies. pp. 202?218. PETS '08, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
URL : http://www.cs.columbia.edu/~smb/papers/anonrep.pdf
A face is exposed for aol searcher no, p.4417749, 2006. ,
A decentralized anonymity-preserving reputation system with constant-time score retrieval (technical report) Cryptology ePrint Archive, Report, vol.2016416, p.416, 2016. ,
Signatures of Reputation, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, pp.400-407, 2010. ,
DOI : 10.1007/978-3-642-14577-3_35
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, Public Key Cryptography PKC 2003, pp.31-46, 2002. ,
DOI : 10.1007/3-540-36288-6_3
URL : http://www.mathmagic.cn/crypt1998-2003/papers/2567/25670031.pdf
Efficient Blind Signatures Without Random Oracles, Security in Communication Networks, pp.134-148, 2005. ,
DOI : 10.1007/978-3-540-30598-9_10
Proof systems for general statements about discrete logarithms, 1997. ,
Blind Signatures for Untraceable Payments, pp.199-203, 1983. ,
DOI : 10.1007/978-1-4757-0602-4_18
Untraceable Electronic Cash, Advances in Cryptology CRYPTO 88, pp.319-327, 1990. ,
DOI : 10.1007/0-387-34799-2_25
Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Netw, pp.53-66, 2014. ,
Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13. pp. 21?21. SSYM'04, USENIX Association, 2004. ,
DOI : 10.21236/ADA465464
The Sybil Attack, Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_24
Efficient Non-interactive Proof Systems for Bilinear Groups, Advances in Cryptology EUROCRYPT 2008, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013. ,
DOI : 10.1109/TIFS.2013.2258914
URL : https://hal.archives-ouvertes.fr/hal-01339185
A Certified Digital Signature, Advances in Cryptology CRYPTO 89 Proceedings, pp.218-238, 1990. ,
DOI : 10.1007/0-387-34805-0_21
Bitcoin: A peer-to-peer electronic cash system, 2008. ,
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
Efficient Blind and Partially Blind Signatures Without Random Oracles, Theory of Cryptography, pp.80-99, 2006. ,
DOI : 10.1007/11681878_5
URL : http://eprint.iacr.org/2006/102.pdf
Supporting Privacy in Decentralized Additive Reputation Systems, Lecture Notes in Computer Science, vol.2995, pp.108-119, 2004. ,
DOI : 10.1007/978-3-540-24747-0_9
Privacy-preserving reputation management, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014. ,
DOI : 10.1145/2554850.2554881
Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system, pp.127-157 ,
DOI : 10.1016/S0278-0984(02)11030-3
A Trustless Privacy-Preserving Reputation System, 2016. ,
DOI : 10.1007/978-3-319-33630-5_27
URL : https://hal.archives-ouvertes.fr/hal-01369572