{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:13Z","timestamp":1771700713150,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540769927","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76993-4_6","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T06:30:45Z","timestamp":1194330645000},"page":"62-73","source":"Crossref","is-referenced-by-count":9,"title":["A New Reputation-Based Trust Management Mechanism Against False Feedbacks in Peer-to-Peer Systems"],"prefix":"10.1007","author":[{"given":"Yu","family":"Jin","sequence":"first","affiliation":[]},{"given":"Zhimin","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jinguang","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Hongwu","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Chien, E.: Malicious threats of peer-to-peer networking. Technical report, Symantec corporation (2003)"},{"key":"6_CR2","first-page":"1174","volume-title":"Proceeding of the IEEE Inforcom (Inforcom 2005)","author":"J. Liang","year":"2005","unstructured":"Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P File Sharing Systems. In: Proceeding of the IEEE Inforcom (Inforcom 2005), pp. 1174\u20131185. IEEE Computer Society Press, Miami, USA (2005)"},{"key":"6_CR3","first-page":"124","volume-title":"P2P 2004","author":"R. Gnupta","year":"2004","unstructured":"Gnupta, R., Somani, A.K.: Reputation Management Framework and its Use as Currency in Large-Scale Peer-to-Peer Networks. In: P2P 2004. Proceeding of the 4th International Conference on Peer-to-Peer Computing, pp. 124\u2013132. IEEE Computer Society Press, Zurich, Switzerland (2004)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/544741.544809","volume-title":"Proceeding of the first of International Joint Conference on Autonomous Agents and Multi-agent Systems","author":"B. Yu","year":"2002","unstructured":"Yu, B., Singh, M.P.: An Evidential Model of Distributed Reputation Management. In: Proceeding of the first of International Joint Conference on Autonomous Agents and Multi-agent Systems, pp. 294\u2013301. IEEE Computer Society Press, Bologna, Italy (2002)"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1145\/502585.502638","volume-title":"CIKM 2001","author":"K. Aberer","year":"2001","unstructured":"Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: CIKM 2001. Proceeding of the 10th International Conference on Information and Knowledge Management, pp. 310\u2013317. ACM Press, New York, USA (2001)"},{"key":"6_CR6","first-page":"123","volume-title":"ACM WWW 2003","author":"S.D. Kamvar","year":"2003","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: EigenRep: Reputation Management in Peer-to-Peer Networks. In: ACM WWW 2003. Proceeding of the Twelfth International World Wide Web Conference, pp. 123\u2013134. ACM Press, Budapest, Hungary (2003)"},{"key":"6_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-540-25840-7_3","volume-title":"Agents and Peer-to-Peer Computing","author":"Y. Wang","year":"2004","unstructured":"Wang, Y., Vassileva, J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Moro, G., Sartori, C., Singh, M.P. (eds.) AP2PC 2003. LNCS (LNAI), vol.\u00a02872, pp. 23\u201334. Springer, Heidelberg (2004)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/CCGRID.2005.1558565","volume-title":"CCGrid 2005","author":"T.G. Papaioannou","year":"2005","unstructured":"Papaioannou, T.G., Stamoulis, G.D.: An IncentivesMechanism Promoting Truthful Feedback in Peer-to-Peer Systems. In: CCGrid 2005. Proceeding of the 2005 IEEE International Symposium on Cluster Computing and the Grid, pp. 275\u2013283. IEEE Computer Society Press, Cardiff, UK (2005)"},{"key":"6_CR9","first-page":"441","volume-title":"WWW 2002","author":"F. Cornelli","year":"2002","unstructured":"Cornelli, F., Damiani, E., Capitani, S.D.: Choosing Reputable Servents in a P2P Network. In: WWW 2002. Proceeding of the 11th International World Wide Web Conference, pp. 441\u2013449. ACM Press, Hawaii, USA (2002)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/586110.586138","volume-title":"CCS 2002","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: CCS 2002. Proceeding of the 9th ACM conference on Computer and communications security, pp. 207\u2013216. ACM Press, Washington, USA (2002)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/988772.988787","volume-title":"Proceedings of the 5th ACM Conference on Electronic Commerce","author":"S. Marti","year":"2004","unstructured":"Marti, S., Garcia-Molina, H.: Limited reputation sharing in P2P systems. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 91\u2013101. ACM Press, New York, USA (2004)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Aberer, K.: P-Grid:A self-organizing access structure for P2P information systems. In: Proceeding of the ninth international conference on cooperative information systems, New York, USA, pp. 91\u2013101 (2001)","DOI":"10.1007\/3-540-44751-2_15"},{"key":"6_CR13","unstructured":"Xiong, L., Liu, L.: Peertrust:a trust mechanism for an open peer-to-peer information system. Technical report, College of Computing, Georgia Institute of Technology (2002)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76993-4_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:09Z","timestamp":1619506329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76993-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540769927"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76993-4_6","relation":{},"subject":[]}}