Building trust in peer-to-peer systems: a review
暂无分享,去创建一个
[1] Bo Li,et al. CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] Roger Dingledine,et al. The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .
[3] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[4] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[5] Kostas G. Anagnostakis,et al. Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[6] G. Hardin,et al. Tragedy of the Commons , 1968 .
[7] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[8] Angelos D. Keromytis,et al. Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.
[9] J. J. Garcia-Luna-Aceves,et al. Secure hierarchical multicast routing and multicast internet anonymity , 1999 .
[10] Fabrice Guillemin,et al. Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks , 2004, Eur. Trans. Telecommun..
[11] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[12] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[13] Il Im,et al. The effect of negative buyer feedback on prices in Internet auction markets , 2000, ICIS.
[14] Angelos D. Keromytis,et al. Fileteller: Paying and Getting Paid for File Storage , 2002, Financial Cryptography.
[15] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[16] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[17] Paul A. Pavlou,et al. Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..
[18] Hector Garcia-Molina,et al. Protecting the PIPE from malicious peers , 2002 .
[19] J. Wooders,et al. Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .
[20] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[21] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[22] I. Foster,et al. ‘To Share or not to Share’ An Analysis of Incentives to Contribute in Collaborative File Sharing Environments , 2003 .
[23] Brian D. Noble,et al. Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.
[24] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[26] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[27] Chrysanthos Dellarocas,et al. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..
[28] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[29] Bill Broyles. Notes , 1907, The Classical Review.
[30] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[31] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[32] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[33] Munindar P. Singh,et al. Incentive Mechanisms for Peer-to-Peer Systems , 2003, AP2PC.
[34] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[35] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[36] Dan S. Wallach,et al. Enforcing Fair Sharing of Peer-to-Peer Resources , 2003, IPTPS.
[37] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[38] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[39] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[40] Chrysanthos Dellarocas. The Digitization of Word-of-mouth: Promise and Challenges of Online Reputation Mechanisms , 2022 .
[41] Amin Vahdat,et al. SHARP: an architecture for secure resource peering , 2003, SOSP '03.
[42] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[43] Brian Neil Levine,et al. Hordes: a Multicast-Based Protocol for Anonymity , 2002, J. Comput. Secur..
[44] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[45] Ling Liu,et al. A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[46] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[47] Alberto Blanc,et al. Designing incentives for peer-to-peer routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[48] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[49] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[50] Ion Stoica,et al. Incentives for Cooperation in Peer-to-Peer Networks , 2003 .
[51] Riccardo Bettati,et al. An optimal strategy for anonymous communication protocols , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[52] Daniel W. Manchala. E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..
[53] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[54] Chrysanthos Dellarocas,et al. Self-Interest, Reciprocity, and Participation in Online Reputation Systems , 2004 .
[55] Bo Li,et al. DONet: A Data-Driven Overlay Network For Efficient Live Media Streaming , 2004, INFOCOM 2005.