A content-driven reputation system for the wikipedia, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.261-270, 2007. ,
DOI : 10.1145/1242572.1242608
Games with a Purpose, Computer, vol.39, issue.6, 2006. ,
DOI : 10.1109/MC.2006.196
Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies, pp.202-218, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
A Cryptographic Framework for the Controlled Release of Certified Data, Twelfth International Workshop on Security Protocols, 2004. ,
DOI : 10.1007/3-540-45682-1_31
Incentivizing outsourced computation, Proceedings of the 3rd international workshop on Economics of networked systems, NetEcon '08, pp.85-90, 2008. ,
DOI : 10.1145/1403027.1403046
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.3511
Privacy-friendly incentives and their application to Wikipedia (extended version) Cryptology ePrint Archive Report, p.401, 2010. ,
DOI : 10.1007/978-3-642-17303-5_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6807
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586114
Compact E-Cash, Advances in Cryptology ? Eurocrypt 2005, pp.302-321, 2005. ,
DOI : 10.1007/11426639_18
On the Portability of Generalized Schnorr Proofs, ) Advances in Cryptology ? EUROCRYPT 2009, 2009. ,
DOI : 10.1007/11556992_11
Practical Verifiable Encryption and Decryption of Discrete Logarithms, Advances in Cryptology ? CRYPTO 2003, pp.126-144, 2003. ,
DOI : 10.1007/978-3-540-45146-4_8
Efficient group signature schemes for large groups, Advances in Cryptology ? CRYPTO '97, pp.410-424, 1997. ,
DOI : 10.1007/BFb0052252
An integer commitment scheme based on groups with hidden order, Advances in Cryptology ? ASIACRYPT 2002, 2002. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology ? CRYPTO '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
Internet encyclopaedias go head to head http:// www.nature.com/nature IBM: Cryptographic protocols of the Identity Mixer library, v. 2.3, Nature IBM Research Report RZ3730, IBM Research, vol.438, issue.17, 2005. ,
DOI : 10.1038/438900a
Slash(dot) and burn, Proceedings of the 2004 conference on Human factors in computing systems , CHI '04, 2004. ,
DOI : 10.1145/985692.985761
Pseudonym Systems, Selected Areas in Cryptography, 1999. ,
DOI : 10.1007/3-540-46513-8_14
Zvi: Supporting privacy in decentralized additive reputation systems, p.2004, 2004. ,
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology ? CRYPTO '91, pp.129-140 ,
DOI : 10.1007/3-540-46766-1_9
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities, pp.123-134, 2006. ,
DOI : 10.1007/0-387-33406-8_11
visualizations, Proceedings of the 2004 conference on Human factors in computing systems , CHI '04, p.2004, 2004. ,
DOI : 10.1145/985692.985765