C. M. Jos, T. Baeten, M. A. Basten, and . Reniers, Process algebra: equational theories of communicating processes, 2010.

P. Billingsley, Probability and measure, 1995.

B. Blanchet, Security Protocol Verification: Symbolic and Computational Models, Proceedings of the First international conference on Principles of Security and Trust, pp.3-29, 2012.
DOI : 10.1007/978-3-642-28641-4_2

URL : https://hal.archives-ouvertes.fr/hal-00863388

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

D. Dolev, C. Andrew, and . Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983.

R. John and . Douceur, The sybil attack. In Peer-to-peer Systems, pp.251-260, 2002.

A. Thomas and . Henzinger, The theory of hybrid automata, 2000.

K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, pp.1-31, 2009.
DOI : 10.1145/1592451.1592452

S. Jiang, J. Zhang, and Y. Ong, An evolutionary model for constructing robust trust networks, Autonomous Agents and Multi-Agent Systems, pp.813-820, 2013.

A. Jøsang and J. Golbeck, Challenges for robust trust and reputation systems, Security and Trust Management, 2009.

A. Jøsang and R. Ismail, The beta reputation system, Bled Electronic Commerce Conference, pp.41-55, 2002.

R. Kerr and R. Cohen, Towards provably secure trust and reputation systems in e-marketplaces, Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems , AAMAS '07, p.172, 2007.
DOI : 10.1145/1329125.1329334

R. Kerr and R. Cohen, Smart cheaters do prosper: defeating trust and reputation systems International Foundation for Autonomous Agents and Multiagent Systems, Autonomous Agents and Multiagent Systems, pp.993-1000, 2009.

B. Klin and V. Sassone, Structural Operational Semantics for Stochastic Process Calculi, Foundations of Software Science and Computational Structures, pp.428-442, 2008.
DOI : 10.1007/978-3-540-78499-9_30

N. Koblitz and A. Menezes, Another Look at "Provable Security", Cryptology ePrint Archive, 2004.
DOI : 10.1007/s00145-005-0432-z

M. Kwiatkowska, G. Norman, J. Sproston, and F. Wang, Symbolic model checking for probabilistic timed automata, Proc. Joint Conference on Formal Modelling and Analysis of Timed Systems and Formal Techniques in Real-Time and Fault Tolerant Systems, pp.293-308, 2004.

K. Shyong, J. Lam, and . Riedl, Shilling recommender systems for fun and profit, International Conference on World Wide Web, pp.393-402, 2004.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

T. Muller, Y. Liu, S. Mauw, and J. Zhang, On Robustness of Trust Systems, 2014.
DOI : 10.1007/978-3-662-43813-8_4

URL : https://hal.archives-ouvertes.fr/hal-01381678

T. Muller and P. Schweitzer, A Formal Derivation of Composite Trust, Foundations and Practice of Security, pp.132-148
DOI : 10.1007/978-3-642-37119-6_9

T. Muller and P. Schweitzer, On Beta Models with Trust Chains, Trust Management VII, pp.49-65
DOI : 10.1007/978-3-642-38323-6_4

URL : https://hal.archives-ouvertes.fr/hal-01468207

J. William and . Stewart, Introduction to the numerical solution of Markov chains, 1994.

Y. Lindsay-sun, Z. Han, W. Yu, and R. Liu, Attacks on trust evaluation in distributed networks, Information Sciences and Systems, pp.1461-1466, 2006.

J. Zhang and R. Cohen, Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach, Electronic Commerce Research and Applications, pp.330-340, 2008.
DOI : 10.1016/j.elerap.2008.03.001

L. Zhang, S. Jiang, J. Zhang, and W. Ng, Robustness of Trust Models and Combinations for Handling Unfair Ratings, Trust Management VI, pp.36-51, 2012.
DOI : 10.1007/978-3-642-29852-3_3