ResearchArticle Globally Decoupled Reputations for Large Distributed Networks
暂无分享,去创建一个
Gayatri Swamynathan | Ben Y. Zhao | Kevin C. Almeroth | Haitao Zheng | Haitao Zheng | K. Almeroth | G. Swamynathan
[1] Zhan Zhang,et al. MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[2] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[3] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[5] Emin Gün Sirer,et al. Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.
[6] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[7] Ben Y. Zhao,et al. Deployment of a Large-scale Peer-to-Peer Social Network , 2004, WORLDS.
[8] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[9] Partha Dasgupta,et al. Pride: peer-to-peer reputation infrastructure for decentralized environments , 2004, WWW Alt. '04.
[10] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[11] Hector Garcia-Molina,et al. Identity crisis: anonymity vs reputation in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[12] Beng Chin Ooi,et al. Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques , 2003, WAIM.
[13] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[14] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[16] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[17] Kenneth L. Calvert,et al. Modeling Internet topology , 1997, IEEE Commun. Mag..
[18] Donald E. Knuth,et al. The Stanford GraphBase - a platform for combinatorial computing , 1993 .