{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:55:11Z","timestamp":1762271711935},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tifs.2013.2258914","type":"journal-article","created":{"date-parts":[[2013,4,18]],"date-time":"2013-04-18T18:08:44Z","timestamp":1366308524000},"page":"949-962","source":"Crossref","is-referenced-by-count":57,"title":["A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model"],"prefix":"10.1109","volume":"8","author":[{"given":"O.","family":"Hasan","sequence":"first","affiliation":[]},{"given":"L.","family":"Brunie","sequence":"additional","affiliation":[]},{"given":"E.","family":"Bertino","sequence":"additional","affiliation":[]},{"family":"Ning Shang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384044"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref13","author":"hasan","year":"2012","journal-title":"A decentralized privacy preserving reputation protocol for the malicious adversarial model"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09428-1_11"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-540-45229-4_21","article-title":"A privacy-enhanced peer-to-peer reputation system","author":"kinateder","year":"2003","journal-title":"Proc Int Con on E-commerce and Web Technologies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067033"},{"key":"ref17","first-page":"202","article-title":"Reputation systems for anonymous networks","author":"androulaki","year":"2008","journal-title":"Proc PETS'08"},{"key":"ref18","first-page":"199","article-title":"Blind signatures for untraceable payments","author":"chaum","year":"1982","journal-title":"Advances in Cryptology (Crypto 82)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4"},{"key":"ref4","article-title":"Supporting privacy in decentralized additive reputation systems","author":"pavlov","year":"2004","journal-title":"Second International Conference on Trust Management (iTrust 2004)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_11"},{"key":"ref3","first-page":"291","article-title":"Methods for computing trust and reputation while preserving privacy","author":"gudes","year":"2009","journal-title":"Proc DBSec'09"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref5","first-page":"213","author":"gambetta","year":"2000","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.003"},{"key":"ref9","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Proc CRYPTO'86"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"ref20","first-page":"303","article-title":"Tor: The second-generation Onion router","author":"dingledine","year":"2004","journal-title":"Proc Usenix Security Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655197"},{"key":"ref21","first-page":"209","article-title":"Privacy and liveliness for reputation systems","author":"schiffner","year":"2009","journal-title":"Proc EuroPKI'09"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref23","first-page":"400","article-title":"Signatures of reputation: Towards trust without identity","author":"bethencourt","year":"2010","journal-title":"Proc Int Conf Financial Cryptography (FC '10)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9277-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6516989\/06504756.pdf?arnumber=6504756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:45:10Z","timestamp":1638218710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6504756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2258914","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}