Jøsang, 2006
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Jøsang | Trust and reputation systems | |
| Zhang et al. | Social media security and trustworthiness: overview and new direction | |
| Aïmeur et al. | Alambic: a privacy-preserving recommender system for electronic commerce | |
| Jøsang et al. | Simplification and analysis of transitive trust networks | |
| Xiong et al. | Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities | |
| Golbeck | Introduction to computing with social trust | |
| Yan et al. | Trust modeling and management: from social trust to digital trust | |
| Yan | Trust Management in Mobile Environments: Autonomic and Usable Models: Autonomic and Usable Models | |
| Kim et al. | Linking blockchain technology and digital advertising: How blockchain technology can enhance digital advertising to be more effective, efficient, and trustworthy | |
| Feng et al. | Vulnerabilities and countermeasures in context-aware social rating services | |
| Chang et al. | Trust and reputation relationships in service-oriented environments | |
| Noor et al. | Trust management in cloud services | |
| Tang et al. | Towards trustworthy AI-empowered real-time bidding for online advertisement auctioning | |
| CN118313880A (en) | An advertising push system based on user behavior | |
| Ziegler et al. | Investigating correlations of trust and interest similarity-do birds of a feather really flock together | |
| Samer et al. | A formal model of trust for calculating the quality of X. 509 certificate | |
| Yan et al. | User‐centric trust and reputation model for personal and trusted service selection | |
| Wu et al. | CEPTM: A Cross‐Edge Model for Diverse Personalization Service and Topic Migration in MEC | |
| Bar et al. | Confidentiality and integrity in crowdsourcing systems | |
| Bhuiyan et al. | Trust and reputation management in web-based social network | |
| Anderson | Privacy engineering for social networks | |
| Su et al. | Research on trust propagation models in reputation management systems | |
| Kalameyets | Algorithms and techniques for bot detection in social networks | |
| Flores et al. | Utilizing Web trackers for Sybil defense | |
| Prior et al. | Parents unwittingly leak their children’s data: a GDPR time bomb? |