Journal of Shanghai Jiaotong University ›› 2014, Vol. 48 ›› Issue (07): 899-906.
• Automation Technique, Computer Technology • Previous Articles Next Articles
Received:2013-10-09
Online:2014-07-28
Published:2014-07-28
CLC Number:
ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1. A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers[J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 899-906.
| [1]Hasan O, Brunie L, Bertino E. Preserving privacy of feedback providers in decentralized reputation systems[J]. Computers & Security, 2012, 31(7): 816826. [2]Hasan O, Brunie L, Bertino E. A decentralized privacy preserving reputation protocol for the malicious adversarial model[R]. RRLIRIS2012008, France: University of Lyon, 2012. [3]Dimitriou T, Michalas A. MultiParty trust computation in decentralized environments[C]//5th IFIP International Conference on New Technologies, Mobility and Security(NTMS). Istanbul: IEEE, 2012. [4]Michael T Goodrich, Florian Kerschbaum. Privacyenhanced reputationfeedback methods to reduce feedback extortion in online auctions [C]∥CODASPY’11 Proceedings of the First ACM Conference on Data and Application Security and Privacy. San Antonio: ACM, 2011: 273282. [5]Schiffner S, Sebastian Clauβ, Sandra Steinbrecher. Privacy, liveliness and fairness for reputation[C]∥ Ivana Cˇerná,Tibor Gyimóthy. InSOFSEM. Berlin: Springer Verlag, 2011: 506519. [6]Martucci L A, Ries SMühlhuser M. Sybilfree pseudonyms, privacy and trust: Identity management in the internet of services [J]. Journal of Information Processing, 2011, 19(1): 115. [7]Jan Camenisch, Anna Lysyanskaya. A signature scheme with efficient protocols [C]∥ Stelvio Cimato, Clemente Galdi, Giuseppe Persiano. Security in Communication Networks ’02. Berlin: Springer Verlag, 2002: 268289. [8]Fujisaki E, Okamoto T. Statistical zero knowledge protocols to prove modular polynomial relations [C]∥ Walter Fumy .Advances in Cryptology—CRYPTO’97. Berlin: Springer Verlag, 1997: 1630. [9]Pedersen T P. Noninteractive and informationtheoretic secure verifiable secret sharing[C]∥In Joan Feigenbaum.Advances in Cryptology—CRYPTO’91. Berlin : Springer Verlag, 1992:129140. [10]Camenisch J, Damgard I. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes[C]∥Tatsuaki Okamoto .In ASIACRYPT.Berlin: Springer Verlag, 2000: 331345. [11]Camenisch J, Stadler M. Efficient group signature schemes for large groups[C]∥ Walter Fumy .Advances in Cryptology—CRYPTO’97.Berlin: Springer Verlag, 1997: 410424. [12]Amos Fiat, Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems[C]∥Andrew M Odlyzko. In Advances in Cryptology—CRYPTO ’86. Berlin:Springer Verlag, 1986: 186194. [13]Withby A, Jsang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems[J]. The Icfain Journal of Management Research, 2005,4(2):4864. |
| [1] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
| [2] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
| [3] | HE Jun* (何俊), ZHENG Shi-hui (郑世慧). Intrusion Detection Model with Twin Support Vector Machines [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 448-454. |
| [4] | WANG Kun-a, b , GUO Huang-a, b , WU Meng-b, YANG Zhen-b. An Improved Trust Evaluation Model Based on Topology Transformation for Ad Hoc Networks [J]. Journal of Shanghai Jiaotong University, 2011, 45(08): 1230-1235. |
| [5] |
ZHANG Lei,CAO Zhenfu . An AttributeBased Encryption Scheme Suitable for Distributed Network [J]. Journal of Shanghai Jiaotong University, 2010, 44(11): 1507-1512. |
| [6] |
ZHANG Baowen1,LUO Zheng2,XUE Zhi1,YIN Ying1 . A Network Risk Assessment Model Based on Network Global Privilege Graph [J]. Journal of Shanghai Jiaotong University, 2010, 44(09): 1197-1200. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||