On bidder zones, cell phones and ballot stuffing
暂无分享,去创建一个
[1] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[2] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[3] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.
[4] Ashish Goel,et al. Avoiding ballot stuffing in eBay-like reputation systems , 2005, P2PECON '05.
[5] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[6] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[7] J. A. Clark,et al. Designing Anonymity: A Formal Basis for Identity Hiding , 2005 .
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.