메뉴 건너뛰기




Volumn , Issue , 2007, Pages 332-337

A dynamic anonymous P2P reputation system based on trusted computing technology

Author keywords

Dynamic anonymity; Peer to Peer (P2P); Reputation system; Trusted Computing (TC)

Indexed keywords

COMPUTATION THEORY; COMPUTER SIMULATION;

EID: 39349117514     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2007.69     Document Type: Conference Paper
Times cited : (10)

References (16)
  • 2
    • 39349094723 scopus 로고    scopus 로고
    • S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, Eigenrep: reputation management in P2P networks, In IW3C2, 2003.
    • S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, "Eigenrep: reputation management in P2P networks," In IW3C2, 2003.
  • 3
    • 39349098247 scopus 로고    scopus 로고
    • Trusting pseudonymsanonymous communication in Peer-to-Peer reputation systems
    • September
    • M. Kinateder, R. Terdic, and K. Rothermel, "Trusting pseudonymsanonymous communication in Peer-to-Peer reputation systems," International Journal for Infonomics, September 2005, pp. 1-13.
    • (2005) International Journal for Infonomics , pp. 1-13
    • Kinateder, M.1    Terdic, R.2    Rothermel, K.3
  • 4
    • 35048864339 scopus 로고    scopus 로고
    • Trading privacy for trust
    • iTrust'04, Springer
    • J.M. Seigneur and C.D. Jensen, "Trading privacy for trust," In iTrust'04. LNCS 2995, Springer, 2004.
    • (2004) LNCS , vol.2995
    • Seigneur, J.M.1    Jensen, C.D.2
  • 5
    • 84955569588 scopus 로고    scopus 로고
    • R. Ismail, C. Boyd, A. Josang, and S. Russel, A security architecture for reputation systems, In EC-Web. Prague, Czech Republic, September 2-5, 2003, pp.176-185.
    • R. Ismail, C. Boyd, A. Josang, and S. Russel, "A security architecture for reputation systems," In EC-Web. Prague, Czech Republic, September 2-5, 2003, pp.176-185.
  • 6
    • 39349094184 scopus 로고    scopus 로고
    • R. Ismail, C. Boyd, A. Josang, and S. Russel, Private reputation shemes for P2P systems, In WOSIS, 2004.
    • R. Ismail, C. Boyd, A. Josang, and S. Russel, "Private reputation shemes for P2P systems," In WOSIS, 2004.
  • 7
    • 84943806344 scopus 로고    scopus 로고
    • A. Singh and L. Liu, TrustMe: Anonymous management of trust relationships in decentralized P2P systems, In P2P2003, Sept, 2003
    • A. Singh and L. Liu, "TrustMe: Anonymous management of trust relationships in decentralized P2P systems," In P2P2003, Sept, 2003
  • 8
    • 33745880820 scopus 로고    scopus 로고
    • Supporting privacy in decentralized additive reputation systems
    • iTrust'04, Springer
    • E. Pavlov, J.S. Rosenschein, and Z. Topol, "Supporting privacy in decentralized additive reputation systems," In iTrust'04, LNCS 2995. Springer, 2004, pp. 108-119.
    • (2004) LNCS , vol.2995 , pp. 108-119
    • Pavlov, E.1    Rosenschein, J.S.2    Topol, Z.3
  • 9
    • 33847309213 scopus 로고    scopus 로고
    • A privacy preserving reputation system for mobile information dissemination networks
    • M. Voss, A. Heinemann, and M. Muhlhauser, "A privacy preserving reputation system for mobile information dissemination networks," In SECURECOMM'05, 2005.
    • (2005) SECURECOMM'05
    • Voss, M.1    Heinemann, A.2    Muhlhauser, M.3
  • 10
    • 50249108946 scopus 로고    scopus 로고
    • A framework to provide anonymity in reputation systems
    • July
    • H. Miranda and L. Rodrigues, "A framework to provide anonymity in reputation systems," In MobiQuitous, July 2006.
    • (2006) MobiQuitous
    • Miranda, H.1    Rodrigues, L.2
  • 11
    • 0037330577 scopus 로고    scopus 로고
    • How trustworthy is Trusted Computing?
    • S.J. Vaughan-Nichols, "How trustworthy is Trusted Computing?" IEEE Computer, vol. 36, no. 3, 2003, pp. 18-20.
    • (2003) IEEE Computer , vol.36 , Issue.3 , pp. 18-20
    • Vaughan-Nichols, S.J.1
  • 12
    • 3042699012 scopus 로고    scopus 로고
    • Understanding trusted computing: Will its benefits outweigh its drawbacks?
    • F.W. Felten, "Understanding trusted computing: will its benefits outweigh its drawbacks?" IEEE Security & Privacy, vol. 1, no. 3, 2003, pp.60-62.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 60-62
    • Felten, F.W.1
  • 14
  • 15
    • 39349107180 scopus 로고    scopus 로고
    • A. Hinneburg and D.A. Keim, An efficient approach to clustering in large multimedia databases with noise, In KDD'98, New York, 1998, pp.58-65.
    • A. Hinneburg and D.A. Keim, "An efficient approach to clustering in large multimedia databases with noise," In KDD'98, New York, 1998, pp.58-65.
  • 16
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • G. Atenitse, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," In CRYPTO'00, 2000, pp.255-270.
    • (2000) CRYPTO'00 , pp. 255-270
    • Atenitse, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.