-
2
-
-
0003293531
-
Freeriding on gnutella
-
September
-
Adar, E. and Huberman, B.A. (2000) ‘Freeriding on gnutella’, First Monday, September, Vol. 5, No. 10.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Huberman, B.A.2
-
5
-
-
10444235035
-
Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks
-
Azzouna, N.B. and Guillemin, F. (2004) ‘Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks’, European Transactions on Telecommunications: Special Issue on P2P Networking and P2P Services, Vol. 15, No. 6, pp.511–522.
-
(2004)
European Transactions on Telecommunications: Special Issue on P2P Networking and P2P Services
, vol.15
, Issue.6
, pp. 511-522
-
-
Azzouna, N.B.1
Guillemin, F.2
-
6
-
-
0141816228
-
Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior
-
Ba, S. and Pavlou, P.A. (2002) ‘Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior’, MIS Quarterly, Vol. 26, No. 3.
-
(2002)
MIS Quarterly
, vol.26
, Issue.3
-
-
Ba, S.1
Pavlou, P.A.2
-
7
-
-
0002863367
-
Valuation of trust in open networks
-
LNCS875
-
Beth, T., Borcherding, M. and Klein, B. (1994) ‘Valuation of trust in open networks’, Proceedings of the Third European Symposium on Research in Computer Security (ESORICS’94), LNCS875, pp.3–18.
-
(1994)
Proceedings of the Third European Symposium on Research in Computer Security (ESORICS’94)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
8
-
-
25844454674
-
VDesigning incentives for peer-to-peer routing
-
Blanc, A., Liu, Y. and Vahdat, A. (2005) ‘VDesigning incentives for peer-to-peer routing’, Proceedings of IEEE INFOCOM 2005, pp.374–385.
-
(2005)
Proceedings of IEEE INFOCOM 2005
, pp. 374-385
-
-
Blanc, A.1
Liu, Y.2
Vahdat, A.3
-
9
-
-
84949238095
-
Offline micropayments without trusted hardware
-
Blaze, M., Ioannidis, J. and Keromytis, A.D. (2001) ‘Offline micropayments without trusted hardware’, Proceedings of Financial Cryptography (FC’01), LNCS 2339, pp.21–40.
-
(2001)
Proceedings of Financial Cryptography (FC’01), LNCS 2339
, pp. 21-40
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
10
-
-
33744479345
-
Freenet: a distributed anonymous information storage and retrieval system
-
Clarke, I., Sandberg, O., Wiley, B. and Hong, T.W. (2001) ‘Freenet: a distributed anonymous information storage and retrieval system’, Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, pp.46–66.
-
(2001)
Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
11
-
-
0345638006
-
-
Stanford InfoLab Technical Report 2002-27
-
Cooper, B.F., Bawa, M., Daswani, N. and Garcia-Molina, H. (2002) ‘Protecting the PIPE from malicious peers’, Stanford InfoLab Technical Report 2002-27.
-
(2002)
Protecting the PIPE from malicious peers
-
-
Cooper, B.F.1
Bawa, M.2
Daswani, N.3
Garcia-Molina, H.4
-
12
-
-
77953066525
-
Choosing reputable servents in a P2P network
-
Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. (2002) ‘Choosing reputable servents in a P2P network’, Proceedings of the 11th International Conference on World Wide Web, pp.376–386.
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 376-386
-
-
Cornelli, F.1
Damiani, E.2
De Capitani di Vimercati, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P. and Violante, F. (2002) ‘A reputation-based approach for choosing reliable resources in peer-to-peer networks’, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp.207–216.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
15
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
Dellarocas, C. (2000) ‘Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior’, Proceedings of the Second ACM Conference on Electronic Commerce, pp.150–157.
-
(2000)
Proceedings of the Second ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
16
-
-
0242641140
-
The digitization of word-of-mouth: promise and challenges of online reputation mechanisms
-
October
-
Dellarocas, C. (2003) ‘The digitization of word-of-mouth: promise and challenges of online reputation mechanisms’, Management Science, October.
-
(2003)
Management Science
-
-
Dellarocas, C.1
-
17
-
-
34547613995
-
Self-interest, reciprocity, and participation in online reputation systems
-
Working Papers No. 4500-04
-
Dellarocas, C., Fan, M. and Wood, C.A. (2004) ‘Self-interest, reciprocity, and participation in online reputation systems’, MIT Sloan Working Papers No. 4500-04.
-
(2004)
MIT Sloan
-
-
Dellarocas, C.1
Fan, M.2
Wood, C.A.3
-
18
-
-
0003302799
-
The free haven project: distributed anonymous storage servic
-
Dingledine, R., Freedman, M.J. and Molnar, D. (2000) ‘The free haven project: distributed anonymous storage servic’, Proceedings of Workshop on Design Issues in Anonymity and Unobservability, pp.59–82.
-
(2000)
Proceedings of Workshop on Design Issues in Anonymity and Unobservability
, pp. 59-82
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
23
-
-
0039246956
-
The social cost of cheap pseudonyms
-
Friedman, E.J. and Resnick, P. (2001) ‘The social cost of cheap pseudonyms’, Journal of Economics and Management Strategy, Vol. 10, No. 2, pp.173–199.
-
(2001)
Journal of Economics and Management Strategy
, vol.10
, Issue.2
, pp. 173-199
-
-
Friedman, E.J.1
Resnick, P.2
-
24
-
-
21644483415
-
SHARP: an architecture for secure resource peering
-
Fu, Y., Chase, J., Chun, B., Schwab, S. and Vahdat, A. (2003) ‘SHARP: an architecture for secure resource peering’, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pp.133–148.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 133-148
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
25
-
-
84956062561
-
Can 9 million skype users be wrong?
-
Garfinkel, S. (2005) ‘Can 9 million skype users be wrong?’ Computerworld, Vol. 11, No. 11.
-
(2005)
Computerworld
, vol.11
, Issue.11
-
-
Garfinkel, S.1
-
26
-
-
0036372781
-
An optimal strategy for anonymous communication protocols
-
Guan, Y., Fu, X., Bettati, R. and Zhao, W. (2002) ‘An optimal strategy for anonymous communication protocols’, Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), pp.257–266.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002)
, pp. 257-266
-
-
Guan, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
27
-
-
19944395899
-
Propagation of trust and distrust
-
Guha, R., Kumar, R., Raghavan, P. and Tomkins, A. (2004) ‘Propagation of trust and distrust’, Proceedings of the 13th International Conference on World Wide Web, pp.403–412.
-
(2004)
Proceedings of the 13th International Conference on World Wide Web
, pp. 403-412
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
28
-
-
0014413249
-
The tragedy of the commons
-
Hardin, G. (1968) ‘The tragedy of the commons’, Science, Vol. 162, pp.1243–1248.
-
(1968)
Science
, vol.162
, pp. 1243-1248
-
-
Hardin, G.1
-
30
-
-
18844441915
-
Fileteller: paying and getting paid for file storage
-
Ioannidis, J., Ioannidis, S., Keromytis, A.D. and Prevelakis, V. (2002) ‘Fileteller: paying and getting paid for file storage’, Proceedings of Financial Cryptography (FC’02).
-
(2002)
Proceedings of Financial Cryptography (FC’02)
-
-
Ioannidis, J.1
Ioannidis, S.2
Keromytis, A.D.3
Prevelakis, V.4
-
31
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
Kamvar, S.D., Schlosser, M.T. and Garcia-Molina, H. (2003) ‘The eigentrust algorithm for reputation management in P2P networks’, Proceedings of the 12th International Conference on World Wide Web (WWW 2003), pp.640–651.
-
(2003)
Proceedings of the 12th International Conference on World Wide Web (WWW 2003)
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
32
-
-
2442532014
-
Incentives for cooperation in peer-to-peer networks
-
Lai, K., Feldman, M., Stoica, I. and Chuang, J. (2003) ‘Incentives for cooperation in peer-to-peer networks’, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems (P2PEcon ’03).
-
(2003)
Proceedings of the First Workshop on Economics of Peer-to-Peer Systems (P2PEcon ’03)
-
-
Lai, K.1
Feldman, M.2
Stoica, I.3
Chuang, J.4
-
34
-
-
84951713481
-
The effect of negative buyer feedback on prices in internet auction markets
-
Lee, Z., Im, I. and Lee, S.J. (2000) ‘The effect of negative buyer feedback on prices in internet auction markets’, Proceedings of the 21st International Conference on Information Systems (ICIS ’00), pp.286–287.
-
(2000)
Proceedings of the 21st International Conference on Information Systems (ICIS ’00)
, pp. 286-287
-
-
Lee, Z.1
Im, I.2
Lee, S.J.3
-
35
-
-
0036312325
-
Hordes: a protocol for anonymous communication over the internet
-
Levine, B.N. and Shields, C. (2002) ‘Hordes: a protocol for anonymous communication over the internet’, ACM Journal of Computer Security, Vol. 10, No. 3, pp.213–240.
-
(2002)
ACM Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
36
-
-
25844529486
-
Pollution in P2P file sharing systems
-
Liang, J., Kumar, R., Xi, Y. and Ross, K.W. (2005) ‘Pollution in P2P file sharing systems’, Proceedings of INFOCOM 2005, Vol. 2, pp.1174–1185.
-
(2005)
Proceedings of INFOCOM 2005
, vol.2
, pp. 1174-1185
-
-
Liang, J.1
Kumar, R.2
Xi, Y.3
Ross, K.W.4
-
37
-
-
0033893895
-
E-commerce trust metrics and models
-
Manchala, D.W. (2000) ‘E-commerce trust metrics and models’, IEEE Internet Computing, Vol. 4, No. 2, pp.36–44.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.2
, pp. 36-44
-
-
Manchala, D.W.1
-
39
-
-
84956062566
-
-
MojoNation (2000) Available at: http://www.mojonation.net/Mojonation.html.
-
(2000)
-
-
MojoNation1
-
40
-
-
84956062567
-
-
Napster (1999) Available at: http://www.napster.com.
-
(1999)
-
-
Napster1
-
41
-
-
35248864021
-
Enforcing fair sharing of peer-to-peer resources
-
Ngan, T.J., Wallach, D.S. and Druschel, P. (2003) ‘Enforcing fair sharing of peer-to-peer resources’, Proceedings of the Second International Workshop (IPTPS 2003), LNCS 2735, pp.149–159.
-
(2003)
Proceedings of the Second International Workshop (IPTPS 2003), LNCS 2735
, pp. 149-159
-
-
Ngan, T.J.1
Wallach, D.S.2
Druschel, P.3
-
42
-
-
0003780986
-
-
Technical Report 1999-66, Stanford University
-
Page, L., Brin, S., Motwani, R. and Winograd, T. (1998) ‘The pageRank citation ranking: bringing order to the web’, Technical Report 1999-66, Stanford University.
-
(1998)
The pageRank citation ranking: bringing order to the web
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
44
-
-
4544349231
-
To share or not to share: an analysis of incentives to contribute in collaborative file sharing environments
-
Ranganathan, K., Ripeanu, M., Sarin, A. and Foster, I. (2003) ‘To share or not to share: an analysis of incentives to contribute in collaborative file sharing environments’, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems (P2PEcon’03).
-
(2003)
Proceedings of the First Workshop on Economics of Peer-to-Peer Systems (P2PEcon’03)
-
-
Ranganathan, K.1
Ripeanu, M.2
Sarin, A.3
Foster, I.4
-
45
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M.G., Syverson, P.F. and Goldschlag, D.M. (1998) ‘Anonymous connections and onion routing’, IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, Vol. 16, No. 4, pp.482–494.
-
(1998)
IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
46
-
-
0002054934
-
Crowds: anonymity for web transactions
-
Reiter, M.K. and Rubin, A.D. (1998) ‘Crowds: anonymity for web transactions’, ACM Transactions on Information and System Security (TISSEC), Vol. 1, No. 1, pp.66–92.
-
(1998)
ACM Transactions on Information and System Security (TISSEC)
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
48
-
-
4544372572
-
A reputation-based trust management system for P2P networks
-
Selçuk, A.A., Uzun, E. and Pariente, M.R. (2004) ‘A reputation-based trust management system for P2P networks’, Proceedings of IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2004), pp.251–258.
-
(2004)
Proceedings of IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2004)
, pp. 251-258
-
-
Selçuk, A.A.1
Uzun, E.2
Pariente, M.R.3
-
49
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Serjantov, A. and Danezis, G. (2002) ‘Towards an information theoretic metric for anonymity’, Proceedings of Privacy Enhancing TechnologiesWorkshop (PET 2002), LNCS 2482, pp.41–53.
-
(2002)
Proceedings of Privacy Enhancing TechnologiesWorkshop (PET 2002), LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
51
-
-
84956062569
-
-
Skype (2003) Available at: http://www.skype.com.
-
(2003)
-
-
Skype1
-
52
-
-
33646831908
-
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
-
Srivatsa, M., Xiong, L. and Liu, L. (2005) ‘TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks’, Proceedings of the 14th International Conference on World Wide Web, pp.422–431.
-
(2005)
Proceedings of the 14th International Conference on World Wide Web
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
57
-
-
3142738238
-
PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong, L. and Liu, L. (2004) ‘PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities’, IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, pp.843–857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
59
-
-
24344485443
-
Cool-streaming/DONet: a data-driven overlay network for efficient live media streaming
-
Zhang, X., Liu, J., Li, B. and Yum, T.P. (2005) ‘Cool-streaming/DONet: a data-driven overlay network for efficient live media streaming’, IEEE INFOCOM 2005, Vol. 3, pp.2102–2111.
-
(2005)
IEEE INFOCOM 2005
, vol.3
, pp. 2102-2111
-
-
Zhang, X.1
Liu, J.2
Li, B.3
Yum, T.P.4
-
61
-
-
84956062571
-
-
Note that, this attack is different from the denial-of-service attack in that the false accusation may be generated towards true transactions
-
Note that, this attack is different from the denial-of-service attack in that the false accusation may be generated towards true transactions.
-
-
-
-
62
-
-
84956062572
-
-
Nodes in peer-to-peer systems play the role of both server and client. Therefore, the term servent is introduced to identify this double responsibility
-
Nodes in peer-to-peer systems play the role of both server and client. Therefore, the term servent is introduced to identify this double responsibility.
-
-
-
|