A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks
暂无分享,去创建一个
[1] Clemens Heinrich,et al. Transport Layer Security (TLS) , 2011, Encyclopedia of Cryptography and Security.
[2] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[3] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[4] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[5] Mostafa H. Ammar,et al. Service Differentiation in Peer-to-Peer Networks Utilizing Reputations , 2003, Networked Group Communication.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Yuguang Fang,et al. A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.
[9] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[10] Peter Szolovits,et al. Ratings in Distributed Systems: A Bayesian Approach , 2002 .
[11] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[12] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[13] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[14] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[15] Stephen D. Bay,et al. Mining distance-based outliers in near linear time with randomization and a simple pruning rule , 2003, KDD '03.
[16] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[17] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[18] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[19] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[20] Evangelos Kotsovinos,et al. Pinocchio: Incentives for Honest Participation in Distributed Trust Management , 2004, iTrust.
[21] Clara Pizzuti,et al. Outlier mining in large high-dimensional data sets , 2005, IEEE Transactions on Knowledge and Data Engineering.
[22] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[23] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[24] Richard M. Karp,et al. Load balancing in dynamic structured P2P systems , 2004, IEEE INFOCOM 2004.
[25] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.