{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:22Z","timestamp":1725494422603},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_5","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"49-60","source":"Crossref","is-referenced-by-count":7,"title":["Trusted Ticket Systems and Applications"],"prefix":"10.1007","author":[{"given":"Nicolai","family":"Kuntze","sequence":"first","affiliation":[]},{"given":"Andreas U.","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Massachusetts Institute of Technology: Kerberos: The Network Authentication Protocol, http:\/\/web.mit.edu\/kerberos"},{"key":"5_CR2","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 94. Technical report, TCG (2006)"},{"key":"5_CR3","unstructured":"Trusted Computing Group: TCG Infrastructure Working Group Reference Architecture for Interoperability (Part I) V. 1.0 Rev. 1. TCG (2005)"},{"key":"5_CR4","unstructured":"4. Trusted Computing Group: TCG Mobile Trusted Module Specification. Specification version 0.9 Revision 1. Technical report, TCG (2006)"},{"key":"5_CR5","first-page":"257","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91. Volume 547 of Lecture Notes in Computer Science","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In Davies, D., ed.: Advances in Cryptology \u2014 EUROCRYPT\u2019 91. Volume 547 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer-Verlag (1991) 257\u2013265"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Schmidt, A.U.: Transitive trust in mobile scenarios. In M\u00fcller, G., ed.: Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006). Volume 3995 of Lecture Notes in Computer Science (LNCS), Springer-Verlag (2006) 73\u201385","DOI":"10.1007\/11766155_6"},{"key":"5_CR7","unstructured":"Kuntze, N., Schmidt, A.U.: Trusted computing in mobile action. In Venter, H.S., Eloff, J.H.P., Labuschagne, L., Rloff, M.M., eds.: Proceedings of the Information Security South Africa (ISSA) Conference (2006)"},{"key":"5_CR8","unstructured":"Kuntze, N., Schmidt, A.U.: Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems. Workshop Virtual Goods at the Conference AXMEDIS 2006, Leeds, UK, 13.-15. Dec. 2006"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Anderson, C: The Long Tail. Wired. October 2004. http:\/\/web.archive.org\/web\/20041127085645\/wired.com\/wired\/archive\/12.10\/tail.html","DOI":"10.1038\/427010a"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/280324.280330","volume":"41","author":"Y. Bakos","year":"1998","unstructured":"Bakos, Y.: The emerging role of electronic marketplaces on the internet. Commun. ACM 41 (1998) 35\u201342","journal-title":"Commun. ACM"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43 (2000) 45\u201348","journal-title":"Communications of the ACM"},{"key":"5_CR12","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Dellarocas, C: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: ACM Conference on Electronic Commerce. (2000) 150\u2013157","DOI":"10.1145\/352871.352889"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In Druschel, P., Kaashoek, F., Rowstron, A., eds.: Peer-to-Peer Systems: First Internationalworkshop, IPTPS 2002 Cambridge, MA, USA, March 7-8, 2002. Volume 2429 of Lecture Notes in Computer Science, Springer-Verlag (2002) 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E.J. Friedman","year":"2001","unstructured":"Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics & Management Strategy 10(2001) 173\u2013199","journal-title":"Journal of Economics & Management Strategy"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Dellarocas, C: Sanctioning reputation mechanisms in online trading environments with moral hazard. MIT Sloan Working Paper No. 4297-03 (2004)","DOI":"10.2139\/ssrn.393043"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: P2PECON\u2019 05: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, ACM Press (2005) 128\u2013132","DOI":"10.1145\/1080192.1080202"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Hubaux, J.P.: Accountable anonymous access to services in mobile communication systems. In: Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems. (1999) 384\u2013389","DOI":"10.1109\/RELDIS.1999.805128"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1016\/j.infsof.2005.08.007","volume":"bd48","author":"G. Zieglera","year":"2006","unstructured":"Zieglera, G., Farkas, C, L\u00f5rincz, A.: A framework for anonymous but accountable self-organizing communities. Inform, and Software Technol. bd48 (2006) 726\u2013744","journal-title":"Inform, and Software Technol"},{"key":"5_CR20","unstructured":"Trusted Computing Group: Mobile Phone Working Group Use Case Scenarios \u2014 v 2.7. Technical report, TCG (2005)"},{"key":"5_CR21","unstructured":"Open Mobile Alliance: Push architecture, draft version 2.2 \u2014 20 jan 2006. oma-ad-push-v2_2-20060120-d. Technical report, Open Mobile Alliance (2006)"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T17:34:09Z","timestamp":1684085649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_5","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}