Formal Approach to Design and Automatic Verification of Cooperation-Based Networks, Journal On Advances in Internet Technology, vol.6, pp.42-56 ,
User-Centric Networking ? Future Perspectives, Lecture Notes in Social Networks, 2014. ,
Virtual currency and reputation-based cooperation incentives in user-centric networks, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.895-900, 2012. ,
DOI : 10.1109/IWCMC.2012.6314323
PRISMgames: A Model Checker for Stochastic Multi-Player Games, 19th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'13), pp.185-191, 2013. ,
The Sybil Attack " , 1st Int. Workshop on Peer-to-Peer Systems, pp.251-260, 2002. ,
A Pseudonymous Communications Infrastructure for the Internet, 2000. ,
Social games, virtual goods, Communications of the ACM, vol.54, issue.4, pp.19-22, 2011. ,
DOI : 10.1145/1924421.1924429
Trust and Reputation Systems, Foundations of Security Analysis and Design IV LNCS, vol.4677, pp.209-245, 2007. ,
DOI : 10.1007/978-3-540-74810-6_8
Privacy through pseudonymity in user-adaptive systems, ACM Transactions on Internet Technology, vol.3, issue.2, pp.149-183, 2003. ,
DOI : 10.1145/767193.767196
Modeling Unlinkability, 3rd Workshop on Privacy Enhancing Technologies, pp.32-47, 2003. ,
Strategic Analysis of Trust Models for User-Centric Networks, Int. Workshop on Strategic Reasoning (SR'13), EPTCS, pp.53-60, 2013. ,
DOI : 10.4204/EPTCS.112.10
Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol.11, issue.8, pp.1287-1303, 2012. ,
DOI : 10.1109/TMC.2011.151
On the tradeoff between trust and privacy in wireless ad hoc networks, Proceedings of the third ACM conference on Wireless network security, WiSec '10, pp.75-80, 2010. ,
DOI : 10.1145/1741866.1741879
Trading Privacy for Trust, 2nd Int. Conf. on Trust Management, pp.93-107, 2004. ,
DOI : 10.1007/978-3-540-24747-0_8
A Formal Model of Trust Lifecycle Management, Workshop on Formal Aspects of Security and Trust, 2003. ,
A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symp. on Security and Privacy, pp.110-122, 2003. ,
Balancing Trust and Incentive in Peer-to-Peer Collaborative System, Journal of Network Security, vol.5, pp.73-81, 2007. ,