Process algebra: equational theories of communicating processes, 2010. ,
Probability and measure, 1995. ,
Security Protocol Verification: Symbolic and Computational Models, Proceedings of the First international conference on Principles of Security and Trust, pp.3-29, 2012. ,
DOI : 10.1007/978-3-642-28641-4_2
URL : https://hal.archives-ouvertes.fr/hal-00863388
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005. ,
DOI : 10.1109/LICS.2005.8
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983. ,
The sybil attack. In Peer-to-peer Systems, pp.251-260, 2002. ,
The theory of hybrid automata, 2000. ,
A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, pp.1-31, 2009. ,
DOI : 10.1145/1592451.1592452
An evolutionary model for constructing robust trust networks, Autonomous Agents and Multi-Agent Systems, pp.813-820, 2013. ,
Challenges for robust trust and reputation systems, Security and Trust Management, 2009. ,
The beta reputation system, Bled Electronic Commerce Conference, pp.41-55, 2002. ,
Towards provably secure trust and reputation systems in e-marketplaces, Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems , AAMAS '07, p.172, 2007. ,
DOI : 10.1145/1329125.1329334
Smart cheaters do prosper: defeating trust and reputation systems International Foundation for Autonomous Agents and Multiagent Systems, Autonomous Agents and Multiagent Systems, pp.993-1000, 2009. ,
Structural Operational Semantics for Stochastic Process Calculi, Foundations of Software Science and Computational Structures, pp.428-442, 2008. ,
DOI : 10.1007/978-3-540-78499-9_30
Another Look at "Provable Security", Cryptology ePrint Archive, 2004. ,
DOI : 10.1007/s00145-005-0432-z
Symbolic model checking for probabilistic timed automata, Proc. Joint Conference on Formal Modelling and Analysis of Timed Systems and Formal Techniques in Real-Time and Fault Tolerant Systems, pp.293-308, 2004. ,
Shilling recommender systems for fun and profit, International Conference on World Wide Web, pp.393-402, 2004. ,
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
On Robustness of Trust Systems, 2014. ,
DOI : 10.1007/978-3-662-43813-8_4
URL : https://hal.archives-ouvertes.fr/hal-01381678
A Formal Derivation of Composite Trust, Foundations and Practice of Security, pp.132-148 ,
DOI : 10.1007/978-3-642-37119-6_9
On Beta Models with Trust Chains, Trust Management VII, pp.49-65 ,
DOI : 10.1007/978-3-642-38323-6_4
URL : https://hal.archives-ouvertes.fr/hal-01468207
Introduction to the numerical solution of Markov chains, 1994. ,
Attacks on trust evaluation in distributed networks, Information Sciences and Systems, pp.1461-1466, 2006. ,
Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach, Electronic Commerce Research and Applications, pp.330-340, 2008. ,
DOI : 10.1016/j.elerap.2008.03.001
Robustness of Trust Models and Combinations for Handling Unfair Ratings, Trust Management VI, pp.36-51, 2012. ,
DOI : 10.1007/978-3-642-29852-3_3