Filtering out unfair ratings in bayesian reputation systems, Proc. 7th Int. Workshop on Trust in Agent Societies, 2004. ,
Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000. ,
DOI : 10.1145/355112.355122
Reputation-based systems : a security analysis, ENISA Position Paper, 2007. ,
Reputation Systems for Anonymous Networks, In : Privacy Enhancing Technologies, pp.202-218, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
Chord : A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM SIGCOMM '01 Conference, 2001. ,
STORM: A Secure Overlay for P2P Reputation Management, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), 2007. ,
DOI : 10.1109/SASO.2007.57
URL : https://hal.archives-ouvertes.fr/hal-00916751
The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, 2002. ,
The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, issue.5878, p.6176, 2008. ,
DOI : 10.17487/rfc5246
A face is exposed for AOL searcher no. 4417749. The New York Times, 2006. ,