V. Buskens and W. Raub, Embedded trust: Control and learning, Group Cohesion, Trust, and Solidarity of Advances in Group Processes, pp.167-202, 2001.
DOI : 10.1080/0022250X.1996.9990182

C. Camerer and K. Weigelt, Experimental Tests of a Sequential Equilibrium Reputation Model, Econometrica, vol.56, issue.1, pp.1-36, 1988.
DOI : 10.2307/1911840

S. Clauß and A. Pfitzmann, Marit Hansen, and Els Van Herreweghen. Privacy-enhancing identity management, The IPTS Report, vol.67, pp.8-16, 2002.

S. Clauß and M. Köhntopp, Identity management and its support of multilateral security, Computer Networks, vol.37, issue.2, pp.205-219, 2001.
DOI : 10.1016/S1389-1286(01)00217-1

P. Dasgupta, Trust as a commodity, Trust: Making and Breaking Cooperative Relations, pp.49-72, 2000.

C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, Proceedings of the 2nd ACM conference on Electronic commerce , EC '00, pp.150-157, 2000.
DOI : 10.1145/352871.352889

URL : http://ccs.mit.edu/dell/ec00reputation.pdf

C. Dellarocas, The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms, Management Science, pp.1407-1424, 2003.

R. John and . Douceur, The sybil attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.

E. Friedman and P. Resnick, The Social Cost of Cheap Pseudonyms, Journal of Economics & Management Strategy, vol.10, issue.2, pp.173-199, 1999.
DOI : 10.1162/105864001300122476

S. Sandeep, P. Kumar, and . Koster, Portable reputation: Proving ownership across portals, Proc. of the European Context Awareness and Trust 2009 (EuroCAT09), 3rd Workshop on Combining Context with Trust, Security, and Privacy CEUR Workshop Proceedings, pp.21-30, 2009.

T. Mahler and T. Olsen, Reputation systems and data protection law In eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp.180-187, 2004.

U. Maurer, Modelling a public-key infrastructure, European Symposium on Research in Computer Security ? ESORICS '96, pp.325-350, 1996.
DOI : 10.1007/3-540-61770-1_45

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.1459

L. Mui, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2003.
DOI : 10.1109/HICSS.2002.994181

F. Pingel and S. Steinbrecher, Multilateral Secure Cross-Community Reputation Systems for Internet Communities, Proceedings of Trust and Privacy in Digital Business , Fifth International Conference, pp.69-78, 2008.
DOI : 10.1007/978-3-540-85735-8_8

S. Schiffner, S. Clauß, and S. Steinbrecher, Privacy and Liveliness for Reputation Systems, Proceedings of 2009 European PKI Workshop (EuroPKI'09, 2010.
DOI : 10.1007/978-3-642-16441-5_14

URL : https://lirias.kuleuven.be/bitstream/123456789/244794/2/article-1265.pdf

S. Steinbrecher, Enhancing Multilateral Security in and by Reputation Systems, Proceedings of the IFIP/FIDIS Internet Security and Privacy Summer School, pp.135-150, 2008.
DOI : 10.1016/S1389-1286(00)00029-3

S. Steinbrecher, S. Groß, and M. Meichau, Jason: A Scalable Reputation System for the Semantic Web, Proceedings of IFIP Sec 2009, IFIP International Information Security Conference: Emerging Challenges for Security, Privacy and Trust, pp.421-431, 2009.
DOI : 10.1007/978-3-540-73133-7_12

M. Voss, Privacy Preserving Online Reputation Systems, International Information Security Workshops, pp.245-260, 2004.
DOI : 10.1007/1-4020-8145-6_20