Embedded trust: Control and learning, Group Cohesion, Trust, and Solidarity of Advances in Group Processes, pp.167-202, 2001. ,
DOI : 10.1080/0022250X.1996.9990182
Experimental Tests of a Sequential Equilibrium Reputation Model, Econometrica, vol.56, issue.1, pp.1-36, 1988. ,
DOI : 10.2307/1911840
Marit Hansen, and Els Van Herreweghen. Privacy-enhancing identity management, The IPTS Report, vol.67, pp.8-16, 2002. ,
Identity management and its support of multilateral security, Computer Networks, vol.37, issue.2, pp.205-219, 2001. ,
DOI : 10.1016/S1389-1286(01)00217-1
Trust as a commodity, Trust: Making and Breaking Cooperative Relations, pp.49-72, 2000. ,
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, Proceedings of the 2nd ACM conference on Electronic commerce , EC '00, pp.150-157, 2000. ,
DOI : 10.1145/352871.352889
URL : http://ccs.mit.edu/dell/ec00reputation.pdf
The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms, Management Science, pp.1407-1424, 2003. ,
The sybil attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002. ,
The Social Cost of Cheap Pseudonyms, Journal of Economics & Management Strategy, vol.10, issue.2, pp.173-199, 1999. ,
DOI : 10.1162/105864001300122476
Portable reputation: Proving ownership across portals, Proc. of the European Context Awareness and Trust 2009 (EuroCAT09), 3rd Workshop on Combining Context with Trust, Security, and Privacy CEUR Workshop Proceedings, pp.21-30, 2009. ,
Reputation systems and data protection law In eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp.180-187, 2004. ,
Modelling a public-key infrastructure, European Symposium on Research in Computer Security ? ESORICS '96, pp.325-350, 1996. ,
DOI : 10.1007/3-540-61770-1_45
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.1459
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2003. ,
DOI : 10.1109/HICSS.2002.994181
Multilateral Secure Cross-Community Reputation Systems for Internet Communities, Proceedings of Trust and Privacy in Digital Business , Fifth International Conference, pp.69-78, 2008. ,
DOI : 10.1007/978-3-540-85735-8_8
Privacy and Liveliness for Reputation Systems, Proceedings of 2009 European PKI Workshop (EuroPKI'09, 2010. ,
DOI : 10.1007/978-3-642-16441-5_14
URL : https://lirias.kuleuven.be/bitstream/123456789/244794/2/article-1265.pdf
Enhancing Multilateral Security in and by Reputation Systems, Proceedings of the IFIP/FIDIS Internet Security and Privacy Summer School, pp.135-150, 2008. ,
DOI : 10.1016/S1389-1286(00)00029-3
Jason: A Scalable Reputation System for the Semantic Web, Proceedings of IFIP Sec 2009, IFIP International Information Security Conference: Emerging Challenges for Security, Privacy and Trust, pp.421-431, 2009. ,
DOI : 10.1007/978-3-540-73133-7_12
Privacy Preserving Online Reputation Systems, International Information Security Workshops, pp.245-260, 2004. ,
DOI : 10.1007/1-4020-8145-6_20