{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:20Z","timestamp":1725500360551},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_27","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"371-386","source":"Crossref","is-referenced-by-count":3,"title":["ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems"],"prefix":"10.1007","author":[{"given":"Junsheng","family":"Chang","sequence":"first","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yangbin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Oram, A.: Peer to Peer: Harnessing the power of disruptive technologies (2001) ISBN 0-596-00110-X","DOI":"10.1145\/375348.377427"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: The Proceedings of Intl. Conf. on Information and Knowledge Management (2001)","DOI":"10.1145\/502585.502638"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Kamwar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: The Proceedings of the twelfth international conference on World Wide Web, Budapest, Hungary (2003)","DOI":"10.1145\/775152.775242"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TKDE.2003.1209003","volume":"15","author":"E. Damiani","year":"2003","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Managing and sharing servents\u2019 reputations in p2p systems. IEEE Transactions on Data and Knowledge Engineering\u00a015(4), 840\u2013854 (2003)","journal-title":"IEEE Transactions on Data and Knowledge Engineering"},{"issue":"7","key":"27_CR5","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management"},{"key":"27_CR6","unstructured":"Yu, B., Singh, M.P., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability (2004)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Chang, J., Wang, H., Yin, G.: A Time-Frame Based Trust Model for P2P Systems. In: Proceedings of 9th International Conference on Information Security Cryptology, Seoul, Korea (2006)","DOI":"10.1007\/11927587_14"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Jurca, R., Faltings, B.: An Incentive Compatible Reputation Mechanism. In: Proc. of the IEEE Conference on Electronic Commerce, Newport Beach, CA, USA (June 2003)","DOI":"10.1145\/860722.860778"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th World Wide Web Conference (2004)","DOI":"10.1145\/988672.988726"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW 2005, pp. 422\u2013431 (2005)","DOI":"10.1145\/1060745.1060808"},{"key":"27_CR11","volume-title":"Proceedings of the 7th Int. Workshop on Trust in Agent Societies (at AAMAS 2004)","author":"A. Withby","year":"2004","unstructured":"Withby, A., J\u00f8sang, A., Indulska, J.: Filtering Out Unfair Ratings in Bayesian Reputation Systems. In: Proceedings of the 7th Int. Workshop on Trust in Agent Societies (at AAMAS 2004), ACM, New York (2004)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Dellarocas, C.: Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. In: ACM Conference on Electronic Commerce, pp. 150\u2013157 (2000)","DOI":"10.1145\/352871.352889"},{"key":"27_CR13","volume-title":"Proceedings of the Third ACM Conference on Electronic Commerce (EC 2001)","author":"M. Chen","year":"2001","unstructured":"Chen, M., Singh, J.: Computing and Using Reputations for Internet Ratings. In: Proceedings of the Third ACM Conference on Electronic Commerce (EC 2001), ACM, New York (2001)"},{"key":"27_CR14","unstructured":"Feng, Z.J., Xian, T., Feng, G.J.: An Optimized Collaborative Filtering Recommendation Algorithm. Journal of Computer Research and Development\u00a041(10) (2004) (in Chinese)"},{"key":"27_CR15","volume-title":"Handbook on Information Systems and Economics","author":"C. Dellarocas","year":"2006","unstructured":"Dellarocas, C.: Reputation mechanisms. In: Hendershott, T. (ed.) Handbook on Information Systems and Economics, Elsevier, Amsterdam (2006)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_6","volume-title":"Trust Management","author":"A. Fernandes","year":"2004","unstructured":"Fernandes, A., Kotsovinos, E., Ostring, S., Dragovic, B.: Pinocchio: Incentives for honest participation in distributed trust management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, Springer, Heidelberg (2004)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Papaioannou, T.G., Stamoulis, G.D.: An Incentives\u2019 Mechanism Promoting Truthful Feedback in Peer-to-Peer Systems. In: Proceedings of the 5th IEEE\/ACM International Symposium in Cluster Computing and the Grid, Cardi, UK (2005)","DOI":"10.1109\/CCGRID.2005.1558565"},{"key":"27_CR18","volume-title":"Handbook on Information Systems and Economics","author":"C. Dellarocas","year":"2006","unstructured":"Dellarocas, C.: Reputation mechanisms. In: Hendershott, T. (ed.) Handbook on Information Systems and Economics, Elsevier, Amsterdam (2006)"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 1994","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) Computer Security - ESORICS 1994. LNCS, vol.\u00a0875, Springer, Heidelberg (1994)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Liu, J., Issarny, V.: An incentive compatible reputation mechanism for ubiquitous computing environments. In: PST 2006. International Conference on Privacy, Security and Trust, Toronto, Canada (2006)","DOI":"10.1145\/1501434.1501478"},{"key":"27_CR21","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.: On handling inaccurate witness reports. In: Proc. 8th International Workshop on Trust in Agent Societies, Utrecht, The Netherlands, pp. 63\u201377 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:20:53Z","timestamp":1557148853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}