A. Emmanuelle, B. Yann, L. Paul, and T. Géraldine, « Reputation for Inter-Domain QoS Routing, IEEE International Symposium on Network Computing and Applications (NCA), 2015.

A. Anc+13a-]-emmanuelle, G. Gilles, L. Paul, P. Nicolas, V. Valérie et al., A Privacy Preserving Distributed Reputation Mechanism, IEEE International Conference on Communications (ICC), pp.1951-1956, 2013.

A. Anc+14-]-emmanuelle, G. Gilles, L. Paul, S. Thomas, V. Valérie et al., Extending Signatures of Reputation, Privacy and Identity Management for Emerging Services and Technologies. Tome 421, pp.165-176, 2014.

L. Paul, . Système-de-réputation-préservant-la-vie, L. Paul, A. Emmanuelle, G. Gilles et al., Atelier Protection de la Vie Privée (APVP) Groix, France, juin 2012, Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), 2015.

L. Paul, A. Emmanuelle, G. Gilles, S. Thomas, V. Valérie et al., Privacy-Preserving Reputation Mechanism : A Usable Solution Handling Negative Ratings, IFIP WG 11.1 International Conference on Trust Management, pp.10-1007, 2015.

A. Alfarez and H. Stephen, « Supporting Trust in Virtual Communities, Hawaii International Conference on System Sciences (HICSS)

A. Masayuki, F. Georg, G. Jens, H. Kristiyan, and O. Miyako, Advances in Cryptology?CRYPTO, Structure-Preserving Signatures and Commitments to Group Elements

A. George and . Aaaaaaa, « The Market for " Lemons " : Quality Uncertainty and the Market Mechanism, The Quarterly Journal of Economics, vol.843, pp.488-500, 1970.

J. A. Aaaaaaaa, G. Christina, M. Ian, M. W. Michael, R. Matthew et al., « Charm : a framework for rapidly prototyping cryptosystems, Journal of Cryptographic Engineering, vol.32, pp.111-128, 2013.

A. Anc+13a-]-emmanuelle, G. Gilles, L. Paul, P. Nicolas, V. Valérie et al., A Privacy Preserving Distributed Reputation Mechanism, IEEE International Conference on Communications (ICC), pp.1951-1956, 2013.

A. Anc+14-]-emmanuelle, G. Gilles, L. Paul, S. Thomas, V. Valérie et al., Extending Signatures of Reputation, Privacy and Identity Management for Emerging Services and Technologies. Tome 421, pp.165-176, 2014.

A. Emmanuelle and R. Aina, « Incentive-Based Robust Reputation Mechanism for P2P Services Sous la direction d'Alexander A. SSS, International Conference on Principles of Distributed Systems (OPODIS), pp.305-319, 2006.

A. Elli, S. Geol, C. , S. M. Bbbbb, and M. Tal, Privacy Enhancing Technologies (PETS) Sous la direction de Nikita BBBBBB et Ian GGGGGGGG, Reputation Systems for Anonymous Networks, pp.202-218, 2008.

D. F. Aaaaaa, K. Koray, L. Patrick, C. H. Gggg, and L. Julio, « Faster Explicit Formulas for Computing Pairings over Ordinary Curves, pp.48-68, 2011.

. [. Aaaaaa, S. Matthias, W. «. Michael, G. De-richard, P. A. Jjjjjj et al., Optimistic Protocols for Fair Exchange Sous la direction, ACM Conference on Computer and Communications Security (CCS) Wherefore Art Whou R3579X ? Anonymized Social Networks, Hidden Patterns, and Structural Steganography International Conference on World Wide Web (WWW). Sous la direction de, pp.7-17, 1145.

B. Lucas, G. Matthew, M. Breno-de, and M. Fabian, Correlation- Resistant Storage via Keyword-Searchable Encryption, Cryptology ePrint Archive Report, vol.417, 2005.

E. Leonard, . Bb, P. Ted, S. George, and W. Norman, « A Maximization Technique Occurring in the Stastical Analysis of Probabilistic Functions of Markov Chains, The Annals of Mathematical Statistics, vol.411, pp.164-171, 1970.

B. John, E. Sss, and S. Dawn, « Signatures of Reputation ». Dans : Financial Cryptography and Data Security (FC) Sous la direction de Radu SSSS, pp.400-407, 2010.

B. Dan and B. Xavier, « Short Signatures without Random Oracles and the SDH Assumption in Bilinear Groups, Journal of Cryptology, vol.21, issue.2, pp.149-177, 2008.

B. Dan, B. Xavier, S. Hovav, . Short-group, and . Signatures, Advances in Cryptology?CRYPTO

B. Dan, K. Matthew, and . Ffffffff, « Identity-Based Encryption from the Weil Pairing Advances in Cryptology?CRYPTO. Sous la direction de Joe KKKKKKK, pp.213-229, 2001.

M. Alberto, W. Adam, S. Nahid, U. Cambridge, and . Kingdom, Sous la direction d, Computational Puzzles as Sybil Defenses International Conference on Peer-to-Peer Computing (P2P). [Byg02] Lee A. BB. Data Protection Law, Approaching Its Rationale, Logic and Limits. Kluwer Law International, pp.171-176, 2002.
URL : https://hal.archives-ouvertes.fr/hal-01493765

C. Jan and L. Anna, « An EEcient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Sous la direction de Birgit PPPPPPPPP, pp.93-118, 2001.

C. Jan and S. Markus, « EEcient Group Signature Schemes for Large Groups (Extended Abstract)

C. Elisabetta and H. Giles, Reputation-based Systems : a security analysis Rapport technique. European Network et Information Security Agency (ENISA), décembrepublications/ archive / reputation -based -systems -a -security -analysis, p.2, 2007.

C. David, H. Et-eugène-van, and . Signatures, Sous la direction de Donald W. DD, pp.257-265, 1991.

C. Sebastian, S. Stefan, K. Florian, C. De-kefei, X. Qi et al., « k-Anonymous Reputation Sous la direction Sous la direction d, Tools for Privacy Preserving Distributed Data Mining ». Dans : SIGKDD Explorations 4, pp.359-368, 2002.

D. Chrysanthos, « Reputation Mechanisms ». Dans : Handbook on Economics and Information systems

D. Roger, M. Nick, F. Paul, . Ssssssss, and . Tor, The Second- Generation Onion Router, USENIX Security Symposium. Sous la direction de Matt BBBBB, pp.303-320, 2004.

R. John, . Ddddddd, . Attack, K. Frans, and R. Antony, Peer-to-Peer Systems, pp.251-260, 2002.

D. Thai and R. Juliano, Flickr's API Signature Forgery Vulnerability. Septembre, p.5, 2009.

E. «. Taher, Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, pp.469-472, 1985.

E. Ehab and S. Vladimiro, « An HMM-based Reputation Model Advances in Security of Information and Communication Networks (SECNET) Sous la direction d'Ali Ismail A, Aboul-Ella HHHHHHHHH et Kensuke BBBB, pp.111-121, 2013.

E. Martin, K. Hans-peter, S. Jörg, and X. Xiaowei, « A Densitybased Algorithm for Discovering Clusters in Large Spatial Databases with Noise, International Conference on Knowledge Discovery and Data Mining (KDD)

F. «. Paul, Practical Scheme for Non-Interactive Veriiable Secret Sharing, Foundations of Computer Science (FOCS), pp.427-437, 1987.

O. De-rafail, R. De, P. Ivan, and V. , Sous la direction, pp.201-217, 2008.

D. Steven, K. G. Ggggggggg, and N. P. Sssss, Pairings for Cryptographers, Cryptology ePrint Archive Report, vol.165, 2006.

D. Steven, K. G. Ggggggggg, and N. P. Sssss, « Pairings for cryptographers, Discrete Applied Mathematics, vol.15616, pp.3113-3121, 2008.

G. «. Diego, Can We Trust Trust ? » Dans : Trust : Making and Breaking Cooperative Relations. Sous la direction de Diego GGGGGGG, pp.213-237, 1990.

T. Michael, . Gggggggg, and K. Florian, « Privacy-Enhanced Reputation- Feedback Methods to Reduce Feedback Extortion in Online Auctions ACM Conference on Data and Application Security and Privacy (CODASPY) Sous la direction de Ravi S. SSSSSS et Elisa BBBBBBB, pp.273-282, 2011.

G. «. Jens, Simulation-Sound NIZK Proofs for a Practical Language and Constant- Size Group Signatures International Conference on the Theory and Application of Cryptology and Information Security?ASIACRYPT. Sous la direction de Xuejia LLL et Kefei CCCC, pp.444-459, 2006.

G. Jens and S. Amit, « EEcient Non-Interactive Proof Systems for Bilinear Groups, pp.415-432, 2008.

H. Darrel, A. J. Mmmmmmm, and V. Scott, Guide to Elliptic Curve Cryptography, Har11] Kristiyan HHHHHHHHHHH. « EEcient Cryptographic Primitives for Non-Interactive Zero-Know-ledge Proofs and Applications Thèse de doctorat, pp.978-978, 2004.

H. «. Omar, Privacy Preserving Reputation Systems for Decentralized Environments, Thèse de doctorat. INSA Lyon, 2010.

H. Omar, B. Lionel, and B. Elisa, « Preserving Privacy of Feedback Providers in Decentralized Reputation Systems, Computers & Security 31, pp.816-826, 2012.

H. Omar, B. Lionel, B. Elisa, and S. Ning, « A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.86, pp.949-962, 2013.

K. J. Hhhhhhh, Z. David, and N. Cristina, « A Survey of Attack and Defense Techniques for Reputation Systems, ACM Computing Surveys, vol.421, pp.1-31, 2009.

J. «. Audun, Trust-based Decision-making for Eletronic Transactions ». Dans : Nordic Workshop on Secure IT Systems (NORDSEC) Sous la direction de Louise Y et T. SSSSSSSS, pp.496-502, 1999.

J. Audun, I. Roslan, and B. Colin, « A Survey of Trust and Reputation Systems for Online Service Provision ». Dans : Decision Support Systems 43 Sous la direction d'Eldon Y, LL et Timon C. DD, issue.2, pp.618-644, 2007.

J. «. Antoine, . One-round, and . Protocol-for-tripartite-diie-hellman, Algorithmic Number Theory. Sous la direction de Wieb BBBBB. Leiden, The Netherlands, pp.385-394, 2000.

D. Sepandar, M. T. Kkkk, . Sssssssss, and G. Hector, « The EigenTrust Algorithm for Reputation Management in P2P Networks, International World Wide Web Conference (WWW), pp.640-651, 2003.

K. Jonathan and L. Yehuda, Introduction to Modern Cryptography, pp.978-979, 2007.

K. Jonathan, N. W. Eeciency-de-sushil, J. Vijayalakshmi, A. Trent, and J. Washington, Sous la direction Centralized, Coercion-Free Reputation System, ACM Conference on Computer and Communications Security (CCS) Privacy in the Electronic Society (WPES). Sous la direction d'Ehab AAASSSSS et Stefano P, pp.155-164, 1145.

L. Paul, . Système-de-réputation-préservant-la-vie, L. Paul, A. Emmanuelle, G. Gilles et al., Atelier Protection de la Vie Privée (APVP) Groix, France, juin 2012, Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), 2015.

L. Paul, A. Emmanuelle, G. Gilles, S. Thomas, V. Valérie et al., Privacy-Preserving Reputation Mechanism : A Usable Solution Handling Negative Ratings, IFIP WG 11.1 International Conference on Trust Management, pp.10-1007, 2015.

L. Émile, Dictionnaire de la langue française. Version électronique créée par François GGGGGG http://www.littre.org. Librairie Hachette, pp.1873-1874

L. Siyuan, Z. Jie, M. Chunyan, Y. Leng, T. et al., An Integrated Clustering-Based Approach to Improve the Robustness of Reputation Systems, International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Sous la direction de Liz SSSSSSSSS, pp.1151-1152, 2011.

M. Tobias and O. Thomas, Reputation Systems and Data Protection Law ». Dans : eAdoption and the Knowledge Economy : Issues, Applications, Case Studies. Sous la direction de Paul CCCCCCCCCC et Miriam CCCCCCCCCC, pp.180-187, 2004.

M. Sergio and G. Hector, « Taxonomy of Trust : Categorizing P2P Reputation Systems, Sous la direction de Raouf BBBB et Alan MMMMMMMM, pp.472-484, 2006.

A. J. Mmmmmmm, « An Introduction to Pairing-based Cryptography ». Dans : Recent Trends in Cryptography, Contemporary Mathematics, vol.477, pp.47-65, 2009.

C. M. Ralph and . Signature, Advances in Cryptology? CRYPTO. Sous la direction de Gilles BBBBBBBB, pp.218-238, 1989.

N. Arvind and S. Vitaly, Robust De-anonymization of Large Sparse Datasets, IEEE Symposium on Security and Privacy : Secure Hash Standard (SHS). Mars 2012. [Nat13] NN IIIIIIIII SS TTTTTTTTTT. FIPS 186-4 : Digital Signatures Standard (DSS). Juillet 2013. [Oka92], pp.111-125, 2008.

O. «. Tatsuaki, Provably Secure and Practical Identiication Schemes and Corresponding Signature Schemes, Advances in Cryptology?CRYPTO

P. «. Pascal, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, pp.223-238, 1999.

P. Andreas and H. Marit, A terminology for talking about privacy by data minimization : Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, p.2, 2010.

R. Sylvia, F. Paul, H. Mark, R. M. Kkkk, S. «. Scott et al., Sous la direction de Rene CCCC et George V, Conference of the Special Interest Group on Data Communications (SIGCOMM), pp.161-172, 2001.

R. «. Aina, Mécanismes et architectures P2P robustes et incitatifs pour la réputation, Thèse de doctorat, 2008.

R. Aina, A. «. Emmanuelle, and . Storm, A Secure Overlay for P2P Reputation Management International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp.247-256, 2007.

R. «. Michel, Consensus in Synchronous Systems : A Concise Guided Tour, Paciic Rim International Symposium on Dependable Computing, pp.221-228

R. Paul and Z. Richard, « Trust Among Strangers in Internet Transactions : Empirical Analysis of eBay's Reputation System, The Economics of the Internet and E-Commerce 11 Sous la direction de Michael R. BB, pp.127-157, 2002.

R. Paul, Z. Richard, F. Eric, and K. Ko, « Reputation Systems, Communications of the ACM, vol.4312, pp.45-48, 2000.

R. Ron, S. Adi, and A. Leonard, « A Method for Obtaining Digital Signatures and Public-Key Cryptosystems Sous la direction de Susan L, Communications of the ACM GGGGGG et Ron RRRRRR, vol.21, issue.2, pp.120-126, 1978.

S. Stefan, A. P. Elmar, and T. , « On the limits of privacy in reputation systems ACM workshop on Privacy in the electronic society (WPES) Sous la direction d'Yan CCCC et Jaideep V, pp.33-42, 2011.

S. Claus-peter, « EEcient Identiication and Signatures for Smart Cards Advances in Cryptology?CRYPTO. Sous la direction de Gilles BBBBBBBB, pp.239-252, 1989.

S. Claus-peter, « EEcient Signature Generation by Smart Cards, Journal of Cryptology, vol.43, pp.161-174, 1991.

S. Glenn, A Mathematical Theory of Evidence, pp.978-0691100425, 1976.

S. Adi, . How, . Share, and . Secret, Sous la direction de Ronald L. RRRRRR A Computational Introduction to Number Theory and Algebra. 2 e édition, Communications of the ACM, vol.2211, pp.612-613, 1979.

J. H. Sss, The Arithmetics of Elliptic Curves. 2 e édition, pp.978-978, 2009.

S. «. Sandra, F. Simone, C. Daniel, S. Petr, C. Brno et al., Enhancing Multilateral Security in and by Reputation Systems The Future of Identity in the Information Society, pp.135-150, 2008.

. Sto+03, S. Ion, M. Robert, L. David, D. R. Kkkkkk et al., « Chord : a Scalable Peerto-Peer Lookup Protocol for Internet Applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003.

F. Paul and . Ssssssss, « A Taxonomy of Replay Attacks, pp.187-191, 1994.

F. Paul, D. M. Ssssssss, . Ggggggggg, G. R. Michael, «. A. et al., Anonymous Connections and Onion Routing Security and Privacy, 10 . 1109 / SECPRI International Workshop on Trust in Agent Societies (TRUST)YS02] Bin Y et Munindar P. SSSSS. « Distributed Reputation Management for Electronic Commerce, pp.44-54, 1997.

M. De and M. Caché, Hidden Markov Model), pp.44-46