{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:12:17Z","timestamp":1742393537513,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540462552"},{"type":"electronic","value":"9783540462569"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11889663_7","type":"book-chapter","created":{"date-parts":[[2006,10,9]],"date-time":"2006-10-09T14:12:37Z","timestamp":1160403157000},"page":"96-110","source":"Crossref","is-referenced-by-count":8,"title":["Uncheatable Reputation for Distributed Computation Markets"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Carbunar","sequence":"first","affiliation":[]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"SETI @ Home, Online at http:\/\/setiathome.ssl.berkeley.edu"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1145\/502585.502638","volume-title":"Proceedings of the tenth international conference on Information and knowledge management","author":"K. Aberer","year":"2001","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the tenth international conference on Information and knowledge management, pp. 310\u2013317. ACM Press, New York (2001)"},{"key":"7_CR3","unstructured":"Alunkal, B., Veljkovic, I.,, G.: v. Laszewski, K. Aminand. Reputation-based Grid Resource Selection. In: Proceedings of the Workshop on Adaptive Grid Middleware, New Orleans, LA (September 2003)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Amira, Y., et al.: Secure group communication in asynchronous networks with failures: Integration and experiments. In: The 20th IEEE International Conference on Distributed Computing Systems, pp. 330\u2013343 (2000)","DOI":"10.1109\/ICDCS.2000.840945"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1145\/501158.501175","volume-title":"Proceedings of the 3rd ACM conference on Electronic Commerce","author":"M. Chen","year":"2001","unstructured":"Chen, M., Singh, J.P.: Computing and using reputations for internet ratings. In: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 154\u2013162. ACM Press, New York (2001)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/586110.586138","volume-title":"Proceedings of the 9th ACM conference on Computer and communications security","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., et al.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 207\u2013216. ACM Press, New York (2002)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/352871.352889","volume-title":"Proceedings of the 2nd ACM conference on Electronic commerce","author":"C. Dellarocas","year":"2000","unstructured":"Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150\u2013157. ACM Press, New York (2000)"},{"key":"7_CR8","unstructured":"Dewan, P., Dasgupta, P.: Securing reputation data in peer-to-peer networks. In: Proceedings of International Conference on Parallel and Distributed Computing and Systems PDCS (2004)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/ICDCS.2004.1281562","volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004)","author":"W. Du","year":"2004","unstructured":"Du, W., et al.: Uncheatable grid computing. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 4\u201311. IEEE Computer Society, Los Alamitos (2004)"},{"key":"7_CR10","volume-title":"Proceedings of the 2001 Conference on Topics in Cryptology","author":"P. Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Proceedings of the 2001 Conference on Topics in Cryptology, Springer, Heidelberg (2001)"},{"key":"7_CR11","unstructured":"Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW (2003)","DOI":"10.1145\/775152.775242"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation in peer-to-peer environments. In: Proceedings of IEEE International Symposium on Cluster Computing and the Grid CCGrid, pp. 259\u2013268 (2004)","DOI":"10.1109\/CCGrid.2004.1336576"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/238168.238184","volume-title":"Proceedings of the 3rd ACM conference on Computer and communications security","author":"M.K. Reiter","year":"1996","unstructured":"Reiter, M.K., et al.: The \u03a9 key management service. In: Proceedings of the 3rd ACM conference on Computer and communications security, pp. 38\u201347. ACM Press, New York (1996)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM (2000)","DOI":"10.1145\/355112.355122"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for p2p networks. In: Proceedings of the IEEE International Symposium on Cluster Computing and the Grid CCGrid, pp. 251\u2013258 (2004)","DOI":"10.1109\/CCGrid.2004.1336575"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, Springer, Heidelberg (2000)"},{"key":"7_CR18","unstructured":"Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the Very Large Databases Conference VLDB (2005)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Szajda, D., Lawson, B., Owen, J.: Hardening functions for large-scale distributed computations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 216\u2013224 (2003)","DOI":"10.1109\/SECPRI.2003.1199338"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/779928.779972","volume-title":"Proceedings of the 4th ACM conference on Electronic commerce","author":"L. Xiong","year":"2003","unstructured":"Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities [extended abstract]. In: Proceedings of the 4th ACM conference on Electronic commerce, pp. 228\u2013229. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11889663_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T09:24:43Z","timestamp":1736587483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11889663_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540462552","9783540462569"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11889663_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}