You are here

Bibliography

Export 16 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is reputation  [Clear All Filters]
2016
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
2005
Bolton GE, Katok E, Ockenfels A. Cooperation among strangers with limited information about reputation. Journal of Public Economics [Internet]. 2005 ;89(8):1457-1468. Available from: doi:10.1016/j.jpubeco.2004.03.008
Cheng A, Friedman E. Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Philadelphia, PA: ACM; 2005. pp. 128–132. Available from: http://doi.acm.org/10.1145/1080192.1080202
2004
Feldman M, Lai K, Stoica I, Chuang J. Robust incentive techniques for peer-to-peer networks. In: EC'04. Proceedings of the 5th ACM Conference on Electronic Commerce. EC'04. Proceedings of the 5th ACM Conference on Electronic Commerce. New York, NY, USA: ACM; 2004. pp. 102–111. Available from: http://doi.acm.org/10.1145/988772.988788
2003
Buchegger S, Boudec J-YL. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In: In Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks”, Sophia-Antipolis. In Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks”, Sophia-Antipolis. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9006
Buchegger S, Boudec J-YL. The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Sophia-Antipolis, France; 2003.
Kamvar SD, Schlosser MT, Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. In: WWW'03. Proceedings of the 12th International Conference on World Wide Web. WWW'03. Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary: ACM; 2003. pp. 640–651. Available from: http://doi.acm.org/10.1145/775152.775242
Marti S, Garcia-Molina H. Identity Crisis: Anonymity vs. Reputation in P2P Systems. In: P2P'03. Proceecings of the 3rd International Conference on Peer-to-Peer Computing. P2P'03. Proceecings of the 3rd International Conference on Peer-to-Peer Computing. Linköping, Sweden: IEEE Computer Society; 2003. p. 134.
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: Proceedings of Workshop on Economics of Peer-to-Peer Systems. Proceedings of Workshop on Economics of Peer-to-Peer Systems. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740
Cox LP, Noble BD. Samsara: Honor Among Thieves in Peer-to-Peer Storage. In: SOSP'03 - Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. SOSP'03 - Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. Bolton Landing, NY, USA: ACM Press; 2003. pp. 120–132. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6734
2002
Cornelli F, Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P. Choosing reputable servents in a P2P network. In: WWW '02: Proceedings of the 11th international conference on World Wide Web. WWW '02: Proceedings of the 11th international conference on World Wide Web. New York, NY, USA: ACM; 2002. pp. 376–386. Available from: http://portal.acm.org/citation.cfm?id=511496#
Mui L, Mohtashemi M, Halberstadt A. A Computational Model of Trust and Reputation. In: HICSS'02. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. HICSS'02. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Big Island, Hawaii, USA: IEEE Computer Society; 2002. pp. 2431 - 2439 . Available from: http://dl.acm.org/citation.cfm?id=820745.821158
Buchegger S, Boudec J-YL. Performance analysis of the CONFIDANT protocol. In: MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM; 2002. pp. 226–236. Available from: http://portal.acm.org/citation.cfm?id=513828#
Dingledine R, Syverson P. Reliable MIX Cascade Networks through Reputation. In: Blaze M Proceedings of Financial Cryptography (FC '02). Proceedings of Financial Cryptography (FC '02). Springer-Verlag, LNCS 2357; 2002. Available from: http://www.springerlink.com/content/g67u25lm80234qj4/