{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T05:11:19Z","timestamp":1723093879892},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icc.2013.6654809","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T17:22:26Z","timestamp":1384190546000},"source":"Crossref","is-referenced-by-count":9,"title":["A privacy preserving distributed reputation mechanism"],"prefix":"10.1109","author":[{"given":"E.","family":"Anceaume","sequence":"first","affiliation":[]},{"given":"G.","family":"Guette","sequence":"additional","affiliation":[]},{"given":"P.","family":"Lajoie-Mazenc","sequence":"additional","affiliation":[]},{"given":"N.","family":"Prigent","sequence":"additional","affiliation":[]},{"given":"V. Viet Triem","family":"Tong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"22","first-page":"3","article-title":"A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks","author":"michiardi","year":"2003","journal-title":"Modeling and Optimization in Mobile Ad Hoc and Wireless Networks"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.44"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14577-3_35","article-title":"Signatures of reputation","author":"bethencourt","year":"2010","journal-title":"Proceedings of the 14thInternational Conference on Financial Cryptography and Data Security (FC)"},{"key":"18","author":"nakamoto","year":"2009","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_13"},{"key":"14","author":"pfitzmann","year":"2010","journal-title":"A Terminology for Talking about Privacy by Data Minimization"},{"key":"11","article-title":"Reputation-based systems: A security analysis","author":"carrara","year":"2007","journal-title":"ENISA Position Paper"},{"key":"12","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"21","article-title":"A face is exposed for AOL searcher no. 4417749","author":"barbaro","year":"2006","journal-title":"The New York Times"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"20","article-title":"The transport layer security (TLS) protocol version 1.2","author":"dierks","year":"2008","journal-title":"RFC 5246 (Proposed Standard) Internet Engineering Task Force"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_22"},{"key":"1","article-title":"Trust management for the semantic Web","author":"richardson","year":"2003","journal-title":"Proceedings of the International Semantic Web Conference"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"7","article-title":"Filtering out unfair ratings in bayesian reputation systems","author":"whitby","year":"2004","journal-title":"Proceedings of the 7thInternational Workshop on Trust in Agent Societies"},{"key":"6","article-title":"The beta reputation system","author":"j\ufffdsang","year":"2002","journal-title":"Proceedings of the 15thBled Electronic Commerce Conference"},{"key":"5","year":"0","journal-title":"eBay"},{"key":"4","article-title":"Enhancing multilateral security in and by reputation systems","author":"steinbrecher","year":"2008","journal-title":"Enhancing Multilateral Security in and by Reputation Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8640.00202"}],"event":{"name":"ICC 2013 - 2013 IEEE International Conference on Communications","location":"Budapest, Hungary","start":{"date-parts":[[2013,6,9]]},"end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637584\/6654691\/06654809.pdf?arnumber=6654809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:45:59Z","timestamp":1498081559000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6654809\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc.2013.6654809","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}