-
1
-
-
50249107540
-
Reputation Systems for Anonymous Networks
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
Androulaki, E., Choi, S., Bellovin, S.M., Malkin, T.: Reputation Systems for Anonymous Networks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 202-218. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 202-218
-
-
Androulaki, E.1
Choi, S.2
Bellovin, S.M.3
Malkin, T.4
-
2
-
-
28444452986
-
Calculating a node's reputation in a mobile ad hoc network
-
Adams, W.J., Hadjichristofi, G.C., Davis, N.J.: Calculating a node's reputation in a mobile ad hoc network. In: Proc. of Int'l Performance Computing and Communications Conference, AZ (April 2005)
-
Proc. of Int'l Performance Computing and Communications Conference, AZ (April 2005)
-
-
Adams, W.J.1
Hadjichristofi, G.C.2
Davis, N.J.3
-
3
-
-
77955310186
-
Signatures of Reputation: Towards Trust Without Identity
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Bethencourt, J., Shi, E., Song, D.: Signatures of Reputation: Towards Trust Without Identity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 400-407. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 400-407
-
-
Bethencourt, J.1
Shi, E.2
Song, D.3
-
4
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol. In: Proc. of ACM MobiHoc, Lausanne, Switzerland, pp. 226-236 (2002)
-
(2002)
Proc. of ACM MobiHoc, Lausanne, Switzerland
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
5
-
-
26444573086
-
Two improved partially blind signature schemes from bilinear pairings
-
Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. Springer, Heidelberg
-
Chow, S.M., Hui, L.C.K., Yiu, S.M., Chow, K.P.: Two improved partially blind signature schemes from bilinear pairings. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 316-328. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3574
, pp. 316-328
-
-
Chow, S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
6
-
-
36849011541
-
SuperTrust: A secure and efficient framework for handling trust in super-peer networks
-
Dimitriou, T., Karame, G., Christou, I.: SuperTrust: a secure and efficient framework for handling trust in super-peer networks. In: Proc. of ACM PODC, pp. 374-375 (2007)
-
(2007)
Proc. of ACM PODC
, pp. 374-375
-
-
Dimitriou, T.1
Karame, G.2
Christou, I.3
-
8
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of 13th USENIX Security Symposium, pp. 303-320 (2004)
-
(2004)
Proc. of 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
9
-
-
85165861426
-
-
http://www.ebay.com
-
-
-
-
10
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Proc. of CCS 2002, Washington, DC, USA, pp. 193-206 (2002)
-
(2002)
Proc. of CCS 2002, Washington, DC, USA
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
11
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad hoc networks
-
He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In: Proc. of Wireless Communications and Networking Conference, pp. 825-830 (2004)
-
(2004)
Proc. of Wireless Communications and Networking Conference
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
12
-
-
42449088961
-
A survey of autonomic computing-degrees, models, and applications
-
August
-
Huebscher, M.C., Mccann, J.A.: A survey of autonomic computing-degrees, models, and applications. ACM Computing Surveys 40(3) (August 2008)
-
(2008)
ACM Computing Surveys
, vol.40
, Issue.3
-
-
Huebscher, M.C.1
Mccann, J.A.2
-
14
-
-
33846834126
-
A Survey of Trust and Reputation Systems for Online Service Provision
-
Josang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618-644 (2007)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
17
-
-
50949122470
-
-
Liu, J., Sun, R., Kou, W., Wang, X.: Efficient ID-based Signature Without Trusted PKG, http://eprint.iacr.org/2007/135.pdf
-
Efficient ID-based Signature Without Trusted PKG
-
-
Liu, J.1
Sun, R.2
Kou, W.3
Wang, X.4
-
18
-
-
70349567489
-
Security threats scenarios in trust and reputation models for distributed systems
-
Marmol, F.G., Perez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Computers & Security 28(7), 605-614 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 605-614
-
-
Marmol, F.G.1
Perez, G.M.2
-
21
-
-
70249126978
-
Sybil proof anonymous reputation management
-
Muller, W., Plotz, H., Redlich, J.-P., Shiraki, T.: Sybil proof anonymous reputation management. In: Proc. of ACM SecureComm 2008 (September 2008)
-
Proc. of ACM SecureComm 2008 (September 2008)
-
-
Muller, W.1
Plotz, H.2
Redlich, J.-P.3
Shiraki, T.4
-
24
-
-
30144435160
-
Trusted P2P transactions with fuzzy reputation aggregation
-
Song, S., Hwang, K., et al.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24-34 (2005)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 24-34
-
-
Song, S.1
Hwang, K.2
-
27
-
-
84880467894
-
The EigenTrust algorithm for reputation management in P2P networks
-
Kamvar, S.D., Schlosser, M.T., Molina, H.G.: The EigenTrust algorithm for reputation management in P2P networks. In: Proc. of the 12th International Conference on World Wide Web, pp. 640-651 (2003)
-
(2003)
Proc. of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Molina, H.G.3
-
28
-
-
85165861590
-
An evidential model of distributed reputation management
-
Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proc. of ACM AAMAS (2002)
-
Proc. of ACM AAMAS (2002)
-
-
Yu, B.1
Singh, M.P.2
-
29
-
-
33845809712
-
Hermes: A auantitative trust establishment framework for reliable data packet delivery in MANETs
-
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Hermes: A auantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security 15(1), 3-38 (2007)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 3-38
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
30
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proc. of IEEE INFOCOM, Miami, USA (2005)
-
Proc. of IEEE INFOCOM, Miami, USA (2005)
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
31
-
-
51649124043
-
RADAR: A ReputAtion-based scheme for Detecting Anomalous nodes in wiReless mesh networks
-
Zhang, Z., Nait-Abdesselam, F., Ho, P.-H., Lin, X.: RADAR: a ReputAtion-based scheme for Detecting Anomalous nodes in wiReless mesh networks. In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2008), Las Vegas, USA (2008)
-
Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2008), Las Vegas, USA (2008)
-
-
Zhang, Z.1
Nait-Abdesselam, F.2
Ho, P.-H.3
Lin, X.4
-
32
-
-
85165857243
-
Towards an Evaluation Framework for Reputation Systems in Autonomic Networks
-
Zhang, Z., Kadobayashi, Y., Nait-Abdesselam, F.: Towards an Evaluation Framework for Reputation Systems in Autonomic Networks. In: Proc. of ChinaCom 2009, Xi'An, China, August 26-28 (2009)
-
Proc. of ChinaCom 2009, Xi'An, China, August 26-28 (2009)
-
-
Zhang, Z.1
Kadobayashi, Y.2
Nait-Abdesselam, F.3
-
33
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24-30 (1999)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
34
-
-
0042933944
-
Sprite: A simple, cheat-proff, credit-based system for mobile ad-hoc networks
-
Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proff, credit-based system for mobile ad-hoc networks. In: Proc. of IEEE INFOCOM, San Francisco, USA (2003)
-
Proc. of IEEE INFOCOM, San Francisco, USA (2003)
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
|