A survey of trust and reputation systems for online service provision, Decis. Support Syst, vol.43, issue.2, pp.618-644, 2007. ,
Dense probabilstic encryption, Proc. of the Workshop on Selected Areas of Cryptography, pp.120-128, 1994. ,
Evaluating 2-DNF Formulas on Ciphertexts, Proc. of TCC, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
Differential Privacy, ICALP, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Cross-community reputation: Policies and alternatives, Proc. of International Conference on Web Based Communities (IADIS -WBC2008), 2008. ,
A Robust and Knot-Aware Trust-Based Reputation Model, Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), pp.167-182, 2008. ,
DOI : 10.1007/978-0-387-09428-1_11
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf
Foundations of Cryptography: Basic Tools, 2000. ,
Foundations of Cryptography Basic Applications, 2004. ,
How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986. ,
DOI : 10.1145/6490.6503
URL : http://dl.acm.org/ft_gateway.cfm?id=6503&type=pdf
How to play any mental game (extended abstract), STOC87, pp.218-229, 1987. ,
DOI : 10.1145/28395.28420
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : https://doi.org/10.1016/0022-0000(84)90070-9
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, pp.34-41, 2009. ,
DOI : 10.1109/WI-IAT.2009.13
Methods for Computing Trust and Reputation While Preserving Privacy, Proc. of DBSEC, pp.291-298, 2009. ,
DOI : 10.1145/359168.359176
Parameter learning of personalized trust models in broker-based distributed trust management, Information Systems Frontiers, vol.8, issue.4, pp.321-333, 2006. ,
The beta reputation system, proceedings of 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, 2002. ,
A computational model of trust and reputation for e-businesses, Proc. of the 35th Annual Hawaii International Conference on System Sciences, p.188, 2002. ,
A new public key cryptosystem based on higher residues, Proceedings of the 5th ACM conference on Computer and communications security , CCS '98, pp.59-66, 1998. ,
DOI : 10.1145/288090.288106
Computing Reputation for Collaborative Private Networks, 2009 33rd Annual IEEE International Computer Software and Applications Conference, pp.246-253, 2009. ,
DOI : 10.1109/COMPSAC.2009.40
A new public-key cryptosystem as secure as factoring, Proc. of EUROCRYPT, pp.308-318, 1998. ,
DOI : 10.1007/BFb0054135
URL : http://www.di.ens.fr/~pointche/proposals/Documents/OkUc98.ps.gz
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. of EUROCRYPT, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Supporting Privacy in Decentralized Additive Reputation Systems, Proc. of 2nd Intl. Conf. on Trust Mgmt, pp.108-119, 2004. ,
DOI : 10.1007/978-3-540-24747-0_9
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. of CRYPTO, pp.129-140, 1991. ,
DOI : 10.1007/3-540-46766-1_9
Multilateral Secure Cross-Community Reputation Systems for Internet Communities, proceedings of TrustBus (TrustBus '08), pp.69-78, 2008. ,
DOI : 10.1007/978-3-540-85735-8_8
Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system The Economics of the Internet and E-Commerce, of Advances in Applied Microeconomics, pp.127-157, 2002. ,
Review on Computational Trust and Reputation Models, Artificial Intelligence Review, vol.18, issue.4, pp.33-60, 2005. ,
DOI : 10.1111/1467-9876.00159
URL : http://www.iiia.csic.es/files/pdfs/1035.pdf
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities, Proc. of the IFIP TC-11 21st International Information Security Conference, pp.123-134, 2006. ,
DOI : 10.1007/0-387-33406-8_11
A trustbased reputation system in peer-to-peer grid, HCI (15), pp.228-235, 2007. ,
Detecting deception in reputation management, Proceedings of the second international joint conference on Autonomous agents and multiagent systems , AAMAS '03, pp.73-80, 2003. ,
DOI : 10.1145/860575.860588
URL : http://www4.ncsu.edu/~byu/papers/p112-yu.pdf
Developing trust in large-scale peer-to-peer systems, Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability, pp.1-10, 2004. ,