-
1
-
-
0042349494
-
Managing and sharing servents' reputations in P2P systems
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, "Managing and sharing servents' reputations in P2P systems," IEEE Trans, on Data and Knowledge Engineering, vol. 15, no. 4, 2003, pp. 840-854.
-
(2003)
IEEE Trans, on Data and Knowledge Engineering
, vol.15
, Issue.4
, pp. 840-854
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
2
-
-
39349094723
-
-
S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, Eigenrep: reputation management in P2P networks, In IW3C2, 2003.
-
S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, "Eigenrep: reputation management in P2P networks," In IW3C2, 2003.
-
-
-
-
3
-
-
39349098247
-
Trusting pseudonymsanonymous communication in Peer-to-Peer reputation systems
-
September
-
M. Kinateder, R. Terdic, and K. Rothermel, "Trusting pseudonymsanonymous communication in Peer-to-Peer reputation systems," International Journal for Infonomics, September 2005, pp. 1-13.
-
(2005)
International Journal for Infonomics
, pp. 1-13
-
-
Kinateder, M.1
Terdic, R.2
Rothermel, K.3
-
4
-
-
35048864339
-
Trading privacy for trust
-
iTrust'04, Springer
-
J.M. Seigneur and C.D. Jensen, "Trading privacy for trust," In iTrust'04. LNCS 2995, Springer, 2004.
-
(2004)
LNCS
, vol.2995
-
-
Seigneur, J.M.1
Jensen, C.D.2
-
5
-
-
84955569588
-
-
R. Ismail, C. Boyd, A. Josang, and S. Russel, A security architecture for reputation systems, In EC-Web. Prague, Czech Republic, September 2-5, 2003, pp.176-185.
-
R. Ismail, C. Boyd, A. Josang, and S. Russel, "A security architecture for reputation systems," In EC-Web. Prague, Czech Republic, September 2-5, 2003, pp.176-185.
-
-
-
-
6
-
-
39349094184
-
-
R. Ismail, C. Boyd, A. Josang, and S. Russel, Private reputation shemes for P2P systems, In WOSIS, 2004.
-
R. Ismail, C. Boyd, A. Josang, and S. Russel, "Private reputation shemes for P2P systems," In WOSIS, 2004.
-
-
-
-
7
-
-
84943806344
-
-
A. Singh and L. Liu, TrustMe: Anonymous management of trust relationships in decentralized P2P systems, In P2P2003, Sept, 2003
-
A. Singh and L. Liu, "TrustMe: Anonymous management of trust relationships in decentralized P2P systems," In P2P2003, Sept, 2003
-
-
-
-
8
-
-
33745880820
-
Supporting privacy in decentralized additive reputation systems
-
iTrust'04, Springer
-
E. Pavlov, J.S. Rosenschein, and Z. Topol, "Supporting privacy in decentralized additive reputation systems," In iTrust'04, LNCS 2995. Springer, 2004, pp. 108-119.
-
(2004)
LNCS
, vol.2995
, pp. 108-119
-
-
Pavlov, E.1
Rosenschein, J.S.2
Topol, Z.3
-
9
-
-
33847309213
-
A privacy preserving reputation system for mobile information dissemination networks
-
M. Voss, A. Heinemann, and M. Muhlhauser, "A privacy preserving reputation system for mobile information dissemination networks," In SECURECOMM'05, 2005.
-
(2005)
SECURECOMM'05
-
-
Voss, M.1
Heinemann, A.2
Muhlhauser, M.3
-
10
-
-
50249108946
-
A framework to provide anonymity in reputation systems
-
July
-
H. Miranda and L. Rodrigues, "A framework to provide anonymity in reputation systems," In MobiQuitous, July 2006.
-
(2006)
MobiQuitous
-
-
Miranda, H.1
Rodrigues, L.2
-
11
-
-
0037330577
-
How trustworthy is Trusted Computing?
-
S.J. Vaughan-Nichols, "How trustworthy is Trusted Computing?" IEEE Computer, vol. 36, no. 3, 2003, pp. 18-20.
-
(2003)
IEEE Computer
, vol.36
, Issue.3
, pp. 18-20
-
-
Vaughan-Nichols, S.J.1
-
12
-
-
3042699012
-
Understanding trusted computing: Will its benefits outweigh its drawbacks?
-
F.W. Felten, "Understanding trusted computing: will its benefits outweigh its drawbacks?" IEEE Security & Privacy, vol. 1, no. 3, 2003, pp.60-62.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 60-62
-
-
Felten, F.W.1
-
14
-
-
14844295011
-
Direct anonymous attestation
-
Oct
-
E. Brickell, J. Camenisch, and L. Chen, "Direct anonymous attestation," In CCS2004, ACM, Oct. 2004, pp.132-145.
-
(2004)
CCS2004, ACM
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
15
-
-
39349107180
-
-
A. Hinneburg and D.A. Keim, An efficient approach to clustering in large multimedia databases with noise, In KDD'98, New York, 1998, pp.58-65.
-
A. Hinneburg and D.A. Keim, "An efficient approach to clustering in large multimedia databases with noise," In KDD'98, New York, 1998, pp.58-65.
-
-
-
-
16
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Atenitse, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," In CRYPTO'00, 2000, pp.255-270.
-
(2000)
CRYPTO'00
, pp. 255-270
-
-
Atenitse, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
|