-
1
-
-
0036187056
-
Mapping the gnutella network
-
January-February
-
"Mapping the gnutella network," IEEE Internet Computing, January-February 2002.
-
(2002)
IEEE Internet Computing
-
-
-
2
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, California, August
-
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," in SIGCOMM, San Diego, California, August 2002, pp. 149-160.
-
(2002)
SIGCOMM
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
3
-
-
33746868868
-
Bayesian network-based trust model in peer-to-peer networks
-
Melbourne, Australia, July
-
Y. Wang, "Bayesian network-based trust model in peer-to-peer networks," in Workshop on "Deception, Fraud and Trust in Agent Societies" at the Autonomous Agents and Multi Agent Systems 2003 Conference (AAMAS-03), Melbourne, Australia, July 2003.
-
(2003)
Workshop on "Deception, Fraud and Trust in Agent Societies" at the Autonomous Agents and Multi Agent Systems 2003 Conference (AAMAS-03)
-
-
Wang, Y.1
-
4
-
-
84962050766
-
Trust and reputation management in a small-world network
-
Boston, MA., July
-
M. Venkatraman, B. Yu, and M. P. Singh, "Trust and reputation management in a small-world network," in Fourth International Conference on MultiAgent Systems, Boston, MA., July 2000, pp. 449-450.
-
(2000)
Fourth International Conference on MultiAgent Systems
, pp. 449-450
-
-
Venkatraman, M.1
Yu, B.2
Singh, M.P.3
-
6
-
-
33646840986
-
An adaptive authentication protocol based on reputation for peer-to-peer system
-
Itaya, Japan
-
H. Lee and K. Kim, "An adaptive authentication protocol based on reputation for peer-to-peer system," in Symposium on Cryptography and Information Security, Itaya, Japan, 2003, pp. 661-666.
-
(2003)
Symposium on Cryptography and Information Security
, pp. 661-666
-
-
Lee, H.1
Kim, K.2
-
9
-
-
33646824299
-
Online reputation mechanisms: A roadmap for future research
-
C. Dellarocas and P. Resnick, "Online reputation mechanisms: A roadmap for future research," MIT, Tech. Rep., 2003.
-
(2003)
MIT, Tech. Rep.
-
-
Dellarocas, C.1
Resnick, P.2
-
11
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Washington, DC, USA: ACM Press
-
E. Damiani, D. C. di Vimercati DEA, S. P. DEI, P. S. DTI, and F. V. DEI, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in Conference on Computer and Communications Security (CCS 02). Washington, DC, USA: ACM Press, 2002, pp. 207-216.
-
(2002)
Conference on Computer and Communications Security (CCS 02)
, pp. 207-216
-
-
Damiani, E.1
Di Vimercati Dea, D.C.2
Dei, S.P.3
Dti, P.S.4
Dei, F.V.5
-
12
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
New York
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in P2P networks," in Twelfth International World Wide Web Conference, New York, 2003, pp. 640-651.
-
(2003)
Twelfth International World Wide Web Conference
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
14
-
-
4544235015
-
CORE: A Collaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia: IEEE, September
-
P. Michiardi and R. Molva, "CORE: A Collaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks," in Communication and Multimedia Security. Portoroz, Slovenia: IEEE, September 2002.
-
(2002)
Communication and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
15
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in dynamic ad-hoc NeTworks
-
Lausanne, CH, June
-
S. Buchegger and J.-Y. L. Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks," in Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002, pp. 226-236.
-
(2002)
Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
16
-
-
4544308674
-
Observation-based cooperation enforcement in ad hoc networks
-
M. B. Sorav Bansal, "Observation-based cooperation enforcement in ad hoc networks," Stanford University, Tech. Rep., 2003.
-
(2003)
Stanford University, Tech. Rep.
-
-
Bansal, M.B.S.1
-
17
-
-
33745900048
-
A robust reputation system for P2P and mobile ad-hoc networks
-
June, [Online]
-
J.-Y. L. B. Sonja Buchegger, "A robust reputation system for P2P and mobile ad-hoc networks," in Second Workshop on Economics of Peer-to-Peer Systems, June 2004. [Online]. Available: http://www.eecs.harvard.edu/P2Pecon/ program.html
-
(2004)
Second Workshop on Economics of Peer-to-peer Systems
-
-
Buchegger, J.-Y.L.B.S.1
-
18
-
-
1642345187
-
Automated trust negotiation over the internet
-
Orlando, Fl.
-
T. Yu, M. Winslett, and K. E. Seamons, "Automated trust negotiation over the internet," in 6th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Fl., 2002.
-
(2002)
6th World Multiconference on Systemics, Cybernetics and Informatics
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
19
-
-
4544304744
-
The sybil attack
-
California
-
J. Douceur, "The sybil attack," in IPTPS02 Workshop, California, 2002.
-
(2002)
IPTPS02 Workshop
-
-
Douceur, J.1
-
20
-
-
19944368546
-
Countering identity farms in reputation systems for P2P networks
-
P. D. Prashant Dewan, "Countering identity farms in reputation systems for P2P networks," Arizona State University, Tech. Rep., 2004.
-
(2004)
Arizona State University, Tech. Rep.
-
-
Dewan, P.D.P.1
-
22
-
-
0039246956
-
The social cost of cheap pseudonyms
-
E. Friedman and P. Resnick, "The social cost of cheap pseudonyms," Journal of Economics and Management Strategy, vol. 10, no. 2, pp. 173-199, 2001.
-
(2001)
Journal of Economics and Management Strategy
, vol.10
, Issue.2
, pp. 173-199
-
-
Friedman, E.1
Resnick, P.2
-
23
-
-
84942795693
-
Handling identity in peer-to-peer systems
-
September
-
M. Hauswirth, A. Datta, and K. Aberer, "Handling identity in peer-to-peer systems," in 6th International Workshop on Mobility in Databases and Distributed Systems, in conjunction with the 14th International Conference on Database and Expert Systems Applications, September 2003.
-
(2003)
6th International Workshop on Mobility in Databases and Distributed Systems, in Conjunction with the 14th International Conference on Database and Expert Systems Applications
-
-
Hauswirth, M.1
Datta, A.2
Aberer, K.3
-
26
-
-
0042349494
-
Managing and sharing servents' reputations in P2P systems
-
July
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati, "Managing and sharing servents' reputations in P2P systems," Knowledge and Data Engineering, IEEE Transactions on, vol. 15, pp. 840-854, July 2003.
-
(2003)
Knowledge and Data Engineering, IEEE Transactions on
, vol.15
, pp. 840-854
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
28
-
-
33745792462
-
Managing trust in peer-to-peer systems using reputation-based techniques
-
LNCS, August
-
B. C. Ooi, C. Y. Kiau, and K.-L. Tan, "Managing trust in peer-to-peer systems using reputation-based techniques," in The 4th International Conference on Web Age Information Management. LNCS, August 2003, http://xena1.ddns.comp.nus.edu.sg/P2P/waim03.pdf.
-
(2003)
The 4th International Conference on Web Age Information Management
-
-
Ooi, B.C.1
Kiau, C.Y.2
Tan, K.-L.3
-
29
-
-
84858881098
-
-
Webpage, [Online]
-
R. Levien, "Advogato," Webpage, 2003. [Online]. Available: www.Advogato.org
-
(2003)
Advogato
-
-
Levien, R.1
-
32
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
Minneapolis, MN, October
-
C. Dellarocas, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior," in ACM Conference on Electronic Commerce, Minneapolis, MN, October 2000, pp. 150-157.
-
(2000)
ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
33
-
-
85030174634
-
GroupLens: An open architecture for collaborative filtering of netnews
-
Chapel Hill, North Carolina, August
-
P. Resnick, N. Iacovou, M. Suchak, P. Bergstorm, and J. Riedl, "GroupLens: An open architecture for collaborative filtering of netnews," in ACM 1994 Conference on Computer Supported Cooperative Work, Chapel Hill, North Carolina, August 1994, pp. 175-186.
-
(1994)
ACM 1994 Conference on Computer Supported Cooperative Work
, pp. 175-186
-
-
Resnick, P.1
Iacovou, N.2
Suchak, M.3
Bergstorm, P.4
Riedl, J.5
-
34
-
-
4544226115
-
On using reputations in ad hoc networks to counter malicious nodes
-
IEEE, July
-
P. Dewan, P. Dasgupta, and A. Bhattacharya, "On using reputations in ad hoc networks to counter malicious nodes," in QoS and Dynamic Systems, (in conjunction with IEEE ICPADS). IEEE, July 2004.
-
(2004)
QoS and Dynamic Systems, (In Conjunction with IEEE ICPADS)
-
-
Dewan, P.1
Dasgupta, P.2
Bhattacharya, A.3
-
36
-
-
4544356002
-
SPRITE: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, USA: IEEE Press
-
S. Zhong, J. Chen, and R. Yang, "SPRITE: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in IEEE INFOCOM. San Francisco, USA: IEEE Press, 2002.
-
(2002)
IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
|