First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
DOI: 10.1109/securecomm.2005.7
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Reputation System for Mobile Information Dissemination Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 10 publications
0
22
0
Order By: Relevance
“…Recently, a number of papers have addressed the issue of reputation and privacy. A typical approach is typified by [10], who incorporate privacy into their scheme. However, their system does not provide unlinkability.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, a number of papers have addressed the issue of reputation and privacy. A typical approach is typified by [10], who incorporate privacy into their scheme. However, their system does not provide unlinkability.…”
Section: Related Workmentioning
confidence: 99%
“…The existing incentive strategies are traditionally classified into three categories [4,8]: barter-based [4,3,59], credit-based [8,43,63,37,62] and reputation-based [1,56,11,57,37,28]. In the following subsections, we will introduce the representative strategies in each category and summarize their common problems.…”
Section: Strategies For Preventing Selfish Behaviormentioning
confidence: 99%
“…Voss et al [57] and Bo et al [8] also present decentralized systems that are based on similar lines. They both suggest using smart cards as the trusted hardware modules.…”
Section: How Security Is Achievedmentioning
confidence: 99%