Back to Results
First PageMeta Content
Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic


A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗
Add to Reading List

Document Date: 2004-05-31 19:56:00


Open Document

File Size: 107,65 KB

Share Result on Facebook

Company

MIT Press / Analyzing Trust / Peer-toPeer Systems / /

/

Facility

University of Maryland / /

IndustryTerm

trust-inference protocol / trust inference protocols / provably-robust protocols / trust-inference protocols / trustinference protocol / given protocol / proposed trustinference protocol / trust-propagation protocols / online reputation mechanisms / eigentrust algorithm / decentralized systems / Reputation systems / p2p networks / reputation/recommender systems / reasonable and robust trust-inference protocols / above protocol / synchronous network / reputation management / p2p systems / /

Organization

National Science Foundation / University of Maryland / Department of Computer Science / MIT / /

Person

Bobby Bhattacharjee / Seungjoon Lee / Rob Sherwood / S. Terzis / P. Nixon / A. Oram / /

Position

editor / clock forward / single player / representative / user player / player / /

ProvinceOrState

Maryland / /

Technology

trustinference protocol / second protocol / specific trust-inference protocols / Knowledge Management / trust-inference protocols / eigentrust algorithm / public key / trust-propagation protocols / existing trust-inference protocols / Peer-to-peer / trust-inference protocol / p2p / given protocol / secret key / existing trust inference protocols / digital signature / proposed trustinference protocol / proposed protocol / /

URL

http /

SocialTag