Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
The familiar stranger: anxiety, comfort, and play in public places
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Introduction to Data Mining, (First Edition)
Introduction to Data Mining, (First Edition)
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Wikinomics: How Mass Collaboration Changes Everything
Wikinomics: How Mass Collaboration Changes Everything
Linked: How Everything Is Connected to Everything Else and What It Means
Linked: How Everything Is Connected to Everything Else and What It Means
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Attested append-only memory: making adversaries stick to their word
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Private distributed collaborative filtering using estimated concordance measures
Proceedings of the 2007 ACM conference on Recommender systems
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Media sharing based on colocation prediction in urban transport
Proceedings of the 14th ACM international conference on Mobile computing and networking
Underground Aesthetics: Rethinking Urban Computing
IEEE Pervasive Computing
Lightweight Distributed Trust Propagation
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
TRULLO - local trust bootstrapping for ubiquitous devices
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
Security and Communication Networks
Hi-index | 0.00 |
To share services, portable devices may need to locate reputable in-range providers and, to do so, they may exchange ratings with each other. However, providers may well tweak ratings to their own advantage. That is why we have designed a new decentralized mechanism (dubbed MobiRate) with which portable devices store ratings in (local) tamperevident tables and check the integrity of those tables through a gossiping protocol. We evaluate the extent to which MobiRate reduces the impact of tampered ratings and consequently locates reputable service providers. We do so using real mobility and social network data. We also assess computational and communication costs of MobiRate on mobile phones.