L. MEKOUAR, Y. IRAQI, and R. BOUTABA, “Peer-to-peer’s most wanted: malicious peers”, Computer Networks, Vol. 50, No. 4, 2006, pp. 545-562.10.1016/j.comnet.2005.07.025
H. Q. Lin, Z. T. Li, and Q. F. Huang, “Multifactor hierarchical fuzzy trust evaluation on peer- to-peer networks”, Peer-to-Peer Network Applications, Vol. 4, 2011, pp. 376–390.10.1007/s12083-010-0096-9
J. Li, “mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients”, Peer-to-Peer Network Applications,Vol. 4, 2011, pp. 325–345.10.1007/s12083-010-0087-x
L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation for E-Businesses”, Proc. 35th Ann. Hawaii Int’l Conf. System Sciences (HICSS ‘02), , 2002, pp. 2431-2439.
A. Das, M. M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 9, No. 2, 2012, pp. 261-274.10.1109/TDSC.2011.57
K. Aberer, Z. Despotovic, “Managing trust in a peer-to-peer information system”, In proceedings of the 10th International Conference on Information and Knowledge Management, ACM Press, Atlanta, GA, United states, 2001, pp. 1-7.10.1145/502585.502638
S. D. Kamvar, M. T. Schlosser, and H. GarciaMolina, “The EigenTrust algorithm for reputation management in P2P networks”, in proceedings of ACM WWW 2003, pp. 640-651.10.1145/775152.775242
L. Xiong, L. Liu, “PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, no.7, 2004, pp. 843-857.10.1109/TKDE.2004.1318566
S. X. Jiang, J. Z. Li, “A Reputation-Based Trust Mechanism for P2P E-Commerce Systems”, Journal of Software, Vol.18, No.10, 2007, pp. 2551-2563.10.1360/jos182551
Z. H. Tan, X. W. Wang, W. Cheng, G. R. Chang, and Z. L. Zhu, “A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History Vector”, Chinese Journal of Computers, Vol. 33, No. 9, 2010, pp. 1725-1735.10.3724/SP.J.1016.2010.01725
E. Damiani, S. D. C. Vimercati, and S. Paraboschi, “A reputation-based approach for choosing reliable resources in peer-to-peer networks”, the 9th ACM Conference on Computer and Communications Security, Washington, DC, 2002, pp. 207-216.10.1145/586110.586138
Z. Despotovic, K. Aberer, “Maximum likelihood estimation of peers’ performance in P2P networks”, the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, 2004, pp. 1-9.
Z. H. Tan, H. Wang, W. Cheng, and G. R. Chang, “A distributed Trust Model for P2P overlay networks based on correlativity of communication history”, Journal of Northeastern University (Natural Science), Vol. 30, No.9, 2009, pp. 1245-1248.
J. Leskovec, D. Huttenlocher, and J. Kleinberg,”Signed Networks in Social Media”, 28th ACM Conference on Human Factors in Computing Systems , 2010, pp. 1361-1370.10.1145/1753326.1753532