共 30 条
[1]
SoK: The Evolution of Sybil Defense via Social Networks
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:382-396
[2]
Andersen R, 2007, LECT NOTES COMPUT SC, V4863, P166
[3]
[Anonymous], 2004, Proceedings of the 13th International Conference on World Wide Web, DOI DOI 10.1145/988672.988727
[4]
[Anonymous], 2014, EPINIONS PRODUCT RAT
[5]
[Anonymous], 2008, P 17 INT C WORLD WID, DOI DOI 10.1145/1367497.1367525
[6]
Opinions of People: Factoring in Privacy and Trust
[J].
APPLIED COMPUTING REVIEW,
2014, 14 (03)
:7-21
[7]
ANTICHEETAH: Trustworthy computing in an outsourced (cheating) environment
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2015, 48
:28-38
[9]
Gao H., 2014, P 30 ANN COMPUTER SE, P76