A. Aldini, Formal Approach to Design and Automatic Verification of Cooperation-Based Networks, Journal On Advances in Internet Technology, vol.6, pp.42-56

A. Aldini and A. Bogliolo, User-Centric Networking ? Future Perspectives, Lecture Notes in Social Networks, 2014.

A. Bogliolo, P. Polidori, A. Aldini, W. Moreira, P. Mendes et al., Virtual currency and reputation-based cooperation incentives in user-centric networks, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.895-900, 2012.
DOI : 10.1109/IWCMC.2012.6314323

T. Chen, V. Forejt, M. Kwiatkowska, D. Parker, and A. Simaitis, PRISMgames: A Model Checker for Stochastic Multi-Player Games, 19th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'13), pp.185-191, 2013.

J. R. Douceur, The Sybil Attack " , 1st Int. Workshop on Peer-to-Peer Systems, pp.251-260, 2002.

I. Goldberg, A Pseudonymous Communications Infrastructure for the Internet, 2000.

S. Greengard, Social games, virtual goods, Communications of the ACM, vol.54, issue.4, pp.19-22, 2011.
DOI : 10.1145/1924421.1924429

A. Jøsang, Trust and Reputation Systems, Foundations of Security Analysis and Design IV LNCS, vol.4677, pp.209-245, 2007.
DOI : 10.1007/978-3-540-74810-6_8

A. Kobsa and J. Schreck, Privacy through pseudonymity in user-adaptive systems, ACM Transactions on Internet Technology, vol.3, issue.2, pp.149-183, 2003.
DOI : 10.1145/767193.767196

S. Köpsell and S. Steinbrecher, Modeling Unlinkability, 3rd Workshop on Privacy Enhancing Technologies, pp.32-47, 2003.

M. Kwiatkowska, D. Parker, and A. Simaitis, Strategic Analysis of Trust Models for User-Centric Networks, Int. Workshop on Strategic Reasoning (SR'13), EPTCS, pp.53-60, 2013.
DOI : 10.4204/EPTCS.112.10

Z. Li and H. Shen, Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol.11, issue.8, pp.1287-1303, 2012.
DOI : 10.1109/TMC.2011.151

M. Raya, R. Shokri, and J. Hubaux, On the tradeoff between trust and privacy in wireless ad hoc networks, Proceedings of the third ACM conference on Wireless network security, WiSec '10, pp.75-80, 2010.
DOI : 10.1145/1741866.1741879

J. Seigneur and C. D. Jensen, Trading Privacy for Trust, 2nd Int. Conf. on Trust Management, pp.93-107, 2004.
DOI : 10.1007/978-3-540-24747-0_8

W. Wagealla, M. Carbone, C. English, S. Terzis, and P. Nixon, A Formal Model of Trust Lifecycle Management, Workshop on Formal Aspects of Security and Trust, 2003.

T. Yu and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symp. on Security and Privacy, pp.110-122, 2003.

Y. Zhang, L. Lin, and J. Huai, Balancing Trust and Incentive in Peer-to-Peer Collaborative System, Journal of Network Security, vol.5, pp.73-81, 2007.