Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
PPay: micropayments for peer-to-peer systems
Proceedings of the 10th ACM conference on Computer and communications security
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Transferred cash grows in size
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Studying Viable Free Markets in Peer-to-Peer File Exchange Applications without Altruistic Agents
Agents and Peer-to-Peer Computing
A lightweight buyer's trust model for micropayment systems
WSEAS Transactions on Information Science and Applications
P2P Incentive Mechanism for File Sharing and Cooperation
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Running on Karma - P2P reputation and currency systems
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Distributed double spending prevention
Proceedings of the 15th international conference on Security protocols
Impact of user selfishness in construction action on the streaming quality of overlay multicast
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Peer-to-peer (P2P) and grid systems allow their users to exchange information and share resources, with little centralised or hierarchical control, instead relying on the fairness of the users to make roughly as much resources available as they use. To enforce this balance, some kind of currency or barter (called karma) is needed that must be exchanged for resources thus limiting abuse. We present a completely decentralised, off-line karma implementation for P2P and grid systems, that detects double-spending and other types of fraud under varying adversarial scenarios. The system is based on tracing the spending pattern of coins, and distributing the normally central role of a bank over a predetermined, but random, selection of nodes. The system is designed to allow nodes to join and leave the system at arbitrary times.