A. Whitby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, Proc. 7th Int. Workshop on Trust in Agent Societies, 2004.

P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000.
DOI : 10.1145/355112.355122

E. Carrara and G. Hogben, Reputation-based systems : a security analysis, ENISA Position Paper, 2007.

E. Androulaki, S. Choi, S. Bellovin, and T. Malkin, Reputation Systems for Anonymous Networks, In : Privacy Enhancing Technologies, pp.202-218, 2008.
DOI : 10.1007/978-3-540-70630-4_13

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord : A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM SIGCOMM '01 Conference, 2001.

A. Ravoaja and E. Anceaume, STORM: A Secure Overlay for P2P Reputation Management, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), 2007.
DOI : 10.1109/SASO.2007.57

URL : https://hal.archives-ouvertes.fr/hal-00916751

A. Jøsang and R. Ismail, The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, 2002.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, issue.5878, p.6176, 2008.
DOI : 10.17487/rfc5246

M. Barbaro and T. Zeller, A face is exposed for AOL searcher no. 4417749. The New York Times, 2006.