A. Jøsang and R. Ismail, The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, pp.41-55, 2002.

B. Yu and M. P. Singh, Distributed Reputation Management for Electronic Commerce, Computational Intelligence, vol.18, issue.4, pp.535-549, 2002.
DOI : 10.1111/1467-8640.00202

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Anceaume and A. Ravoaja, Incentive-Based Robust Reputation Mechanism for P2P Services, Lecture Notes in Computer Science, vol.4305, pp.305-319, 2006.
DOI : 10.1007/11945529_22

URL : https://hal.archives-ouvertes.fr/inria-00121609

E. Anceaume, G. Guette, P. Lajoie-mazenc, N. Prigent, and V. Viet-triem-tong, A privacy preserving distributed reputation mechanism, 2013 IEEE International Conference on Communications (ICC), 2013.
DOI : 10.1109/ICC.2013.6654809

URL : https://hal.archives-ouvertes.fr/hal-00763212

J. Bethencourt, E. Shi, and D. Song, Signatures of Reputation, Lecture Notes in Computer Science, vol.6052, pp.400-407, 2010.
DOI : 10.1007/978-3-642-14577-3_35

S. Steinbrecher, Enhancing Multilateral Security in and by Reputation Systems, of IFIP Advances in Information and Communication Technology, pp.135-150, 2008.
DOI : 10.1016/S1389-1286(00)00029-3

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization, pp.0-34, 2010.

E. Androulaki, S. G. Choi, S. M. Bellovin, and T. Malkin, Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies, pp.202-218, 2008.
DOI : 10.1007/978-3-540-70630-4_13

P. Resnick and R. Zeckhauser, Trust among strangers in internet transactions: Empirical analysis of ebay's reputation system Advances in applied microeconomics, pp.11-127, 2002.

E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, Lecture Notes in Computer Science, vol.2995, pp.108-119, 2004.
DOI : 10.1007/978-3-540-24747-0_9

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Lecture Notes in Computer Science, vol.4965, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, USENIX, pp.303-320, 2004.

G. Fuchsbauer, D. Pointcheval, R. Ostrovsky, R. D. Prisco, and I. Visconti, Anonymous Proxy Signatures, Lecture Notes in Computer Science, vol.5229, pp.201-217, 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

P. Feldman, A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987.
DOI : 10.1109/SFCS.1987.4