Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
In a reputation-based trust management system an entity’s behaviour determines its reputation which in turn affects other entities interaction with it. We present a mathematical...
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Decentralized reputation systems have of late emerged as the prominent method of establishing trust among selfish agents in today’s online environments. A key issue is the effic...
Ariel D. Procaccia, Yoram Bachrach, Jeffrey S. Ros...