-
3
-
-
85091924229
-
-
Thawte web of trust
-
Thawte web of trust. www.thawte.com/secure-email/web-of-trust-wot/.
-
-
-
-
4
-
-
85091942782
-
-
Unedited. News. iReport.com
-
Unedited. Unfiltered. News. iReport.com. www.ireport.com.
-
Unfiltered
-
-
-
7
-
-
49249126404
-
Trust-based Recommendation Systems: An Axiomatic Approach
-
R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz. Trust-based Recommendation Systems: An Axiomatic Approach. In WWW, 2008.
-
(2008)
WWW
-
-
Andersen, R.1
Borgs, C.2
Chayes, J.3
Feige, U.4
Flaxman, A.5
Kalai, A.6
Mirrokni, V.7
Tennenholtz, M.8
-
9
-
-
0038687775
-
Design and Implementation of the idemix Anonymous Credential System
-
J. Camenisch and E. V. Herreweghen. Design and Implementation of the idemix Anonymous Credential System. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Camenisch, J.1
Herreweghen, E. V.2
-
10
-
-
0013175080
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
J. Camenisch and A. Lysyanskay. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In EUROCRYPT, 2001.
-
(2001)
EUROCRYPT
-
-
Camenisch, J.1
Lysyanskay, A.2
-
11
-
-
84887050003
-
SybilInfer: Detecting Sybil Nodes using Social Networks
-
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
12
-
-
4544304744
-
The Sybil Attack
-
March
-
J. R. Douceur. The Sybil Attack. In IPTPS, March 2002.
-
(2002)
IPTPS
-
-
Douceur, J. R.1
-
15
-
-
0001368373
-
Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura
-
P. Jaccard. Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura. In Bulletin del la Socit Vaudoise des Sciences Naturelles 37, 547-579, 1901.
-
(1901)
Bulletin del la Socit Vaudoise des Sciences Naturelles
, vol.37
, pp. 547-579
-
-
Jaccard, P.1
-
16
-
-
84880467894
-
The EigenTrust Algorithm for Reputation Management in P2P Networks
-
S. D. Kamvar, M. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
-
(2003)
WWW
-
-
Kamvar, S. D.1
Schlosser, M.2
Garcia-Molina, H.3
-
18
-
-
3242758032
-
Attack-resistant trust metrics for public key certification
-
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Usenix Security, 1997.
-
(1997)
Usenix Security
-
-
Levien, R.1
Aiken, A.2
-
19
-
-
33750269246
-
Controversial Users Demand Local Trust Metrics: An Experimental Study on epinions. com Community
-
P. Massa and P. Avesani. Controversial Users Demand Local Trust Metrics: An Experimental Study on epinions. com Community. In AAAI, 2005.
-
(2005)
AAAI
-
-
Massa, P.1
Avesani, P.2
-
20
-
-
45749135561
-
Ostra: Leveraging Social Networks to Thwart Unwanted Traffic
-
A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
-
(2008)
NSDI
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K. P.4
-
21
-
-
13244288768
-
Authentication Metric Analysis and Design
-
M. Reiter and S. Stubblebine. Authentication Metric Analysis and Design. In ACM TISSEC, 1999.
-
(1999)
ACM TISSEC
-
-
Reiter, M.1
Stubblebine, S.2
-
26
-
-
78649232233
-
DSybil: Optimal Sybil-Resistance for Recommendation Systems
-
H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal Sybil-Resistance for Recommendation Systems. In IEEE S&P, 2009.
-
(2009)
IEEE S&P
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P. B.4
Xiao, F.5
|