(P2P) applications. However, they themselves are susceptible to various types of attacks.
Since most current efforts lack an exploration of a comprehensive adversary model, we try to
fill in this gap by providing a thorough view of the various credibility threats against a
decentralized reputation system and the respective defense mechanisms. Therefore, we
explore and classify the types of potential attacks against reputation systems for P2P …