Preserving privacy of feedback providers in decentralized reputation systems
暂无分享,去创建一个
[1] Elisa Bertino,et al. Efficient privacy preserving reputation protocols inspired by secure sum , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[2] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[3] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[4] Ehud Gudes,et al. A Robust and Knot-Aware Trust-Based Reputation Model , 2008, IFIPTM.
[5] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[6] Jacques Stern,et al. Practical multi-candidate election system , 2001, PODC '01.
[7] Ehud Gudes,et al. Methods for Computing Trust and Reputation While Preserving Privacy , 2009, DBSec.
[8] Jussara M. Almeida,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).
[9] Elisa Bertino,et al. Elimination of Subjectivity from Trust Recommendation , 2009, IFIPTM.
[10] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[11] Audun Jøsang,et al. Private Reputation Schemes for P2P systems , 2004, WOSIS.
[12] Florian Kerschbaum,et al. A verifiable, centralized, coercion-free reputation system , 2009, WPES '09.
[13] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[14] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[15] Jeffrey S. Rosenschein,et al. Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.
[16] C. Costa,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007 .
[17] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[18] Roslan Ismail,et al. Strong Privacy in Reputation Systems , 2003 .
[19] Mike Burmester,et al. LARS: a locally aware reputation system for mobile ad hoc networks , 2006, ACM-SE 44.
[20] Yang Bo,et al. A Reputation System with Privacy and Incentive , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[21] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[22] Tal Malkin,et al. Reputation Systems for Anonymous Networks , 2008, Privacy Enhancing Technologies.
[23] Max Mühlhäuser,et al. A Privacy Preserving Reputation System for Mobile Information Dissemination Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[24] Ernesto Damiani,et al. Privacy Preserving Reputation Systems for Decentralized Environments , 2010 .
[25] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[26] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[27] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[28] Lan Yu. A reputation system for BitTorrent peer-to-peer file-sharing networks , 2006 .