메뉴 건너뛰기




Volumn , Issue , 2009, Pages

FaceTrust: Assessing the credibility of online personas via social networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898111360     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (27)
  • 3
    • 85091924229 scopus 로고    scopus 로고
    • Thawte web of trust
    • Thawte web of trust. www.thawte.com/secure-email/web-of-trust-wot/.
  • 4
    • 85091942782 scopus 로고    scopus 로고
    • Unedited. News. iReport.com
    • Unedited. Unfiltered. News. iReport.com. www.ireport.com.
    • Unfiltered
  • 8
    • 0038589165 scopus 로고    scopus 로고
    • The Anatomy of a Large-scale Hypertextual Web Search Engine
    • S. Brin and L. Page. The Anatomy of a Large-scale Hypertextual Web Search Engine. In Computer Networks and ISDN Systems, 1998.
    • (1998) Computer Networks and ISDN Systems
    • Brin, S.1    Page, L.2
  • 9
    • 0038687775 scopus 로고    scopus 로고
    • Design and Implementation of the idemix Anonymous Credential System
    • J. Camenisch and E. V. Herreweghen. Design and Implementation of the idemix Anonymous Credential System. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Camenisch, J.1    Herreweghen, E. V.2
  • 10
    • 0013175080 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • J. Camenisch and A. Lysyanskay. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In EUROCRYPT, 2001.
    • (2001) EUROCRYPT
    • Camenisch, J.1    Lysyanskay, A.2
  • 11
    • 84887050003 scopus 로고    scopus 로고
    • SybilInfer: Detecting Sybil Nodes using Social Networks
    • G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 12
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • March
    • J. R. Douceur. The Sybil Attack. In IPTPS, March 2002.
    • (2002) IPTPS
    • Douceur, J. R.1
  • 13
  • 15
    • 0001368373 scopus 로고
    • Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura
    • P. Jaccard. Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura. In Bulletin del la Socit Vaudoise des Sciences Naturelles 37, 547-579, 1901.
    • (1901) Bulletin del la Socit Vaudoise des Sciences Naturelles , vol.37 , pp. 547-579
    • Jaccard, P.1
  • 16
    • 84880467894 scopus 로고    scopus 로고
    • The EigenTrust Algorithm for Reputation Management in P2P Networks
    • S. D. Kamvar, M. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
    • (2003) WWW
    • Kamvar, S. D.1    Schlosser, M.2    Garcia-Molina, H.3
  • 18
    • 3242758032 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification
    • R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Usenix Security, 1997.
    • (1997) Usenix Security
    • Levien, R.1    Aiken, A.2
  • 19
    • 33750269246 scopus 로고    scopus 로고
    • Controversial Users Demand Local Trust Metrics: An Experimental Study on epinions. com Community
    • P. Massa and P. Avesani. Controversial Users Demand Local Trust Metrics: An Experimental Study on epinions. com Community. In AAAI, 2005.
    • (2005) AAAI
    • Massa, P.1    Avesani, P.2
  • 20
    • 45749135561 scopus 로고    scopus 로고
    • Ostra: Leveraging Social Networks to Thwart Unwanted Traffic
    • A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
    • (2008) NSDI
    • Mislove, A.1    Post, A.2    Druschel, P.3    Gummadi, K. P.4
  • 21
    • 13244288768 scopus 로고    scopus 로고
    • Authentication Metric Analysis and Design
    • M. Reiter and S. Stubblebine. Authentication Metric Analysis and Design. In ACM TISSEC, 1999.
    • (1999) ACM TISSEC
    • Reiter, M.1    Stubblebine, S.2
  • 23
  • 26


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.