Privacy inference attack against users in online social networks: a literature review

Y Piao, K Ye, X Cui - IEEE Access, 2021 - ieeexplore.ieee.org
With the rapid development of social networks, users pay more and more attention to the
protection of personal information. However, the transmission of users' personal information …

Trust and reputation management in healthcare systems: taxonomy, requirements and open issues

F Jabeen, Z Hamid, A Akhunzada, W Abdul… - IEEE …, 2018 - ieeexplore.ieee.org
Trust is a salient feature in the context of health care, which is characterized by uncertainty
and an element of risk. It is a fundamental requirement for the acceptance and adoption of …

BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems

HJ Jo, W Choi - Plos one, 2019 - journals.plos.org
Participatory sensing is gaining popularity as a method for collecting and sharing
information from distributed local environments using sensor-rich mobile devices. There are …

A new approach to modelling centralised reputation systems

L Garms, EA Quaglia - Progress in Cryptology–AFRICACRYPT 2019: 11th …, 2019 - Springer
A reputation system assigns a user or item a reputation value which can be used to evaluate
trustworthiness. Blömer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon …

Anonymity-preserving Reputation Management System for health sector

F Jabeen, Z Hamid, W Abdul, S Ghouzali, A Khan… - PloS one, 2018 - journals.plos.org
In health sector, trust is considered important because it indirectly influences the quality of
health care through patient satisfaction, adherence and the continuity of its relationship with …

Anonymity and rewards in peer rating systems

L Garms, SL Ng, EA Quaglia… - Journal of Computer …, 2022 - content.iospress.com
When peers rate each other, they may rate inaccurately to boost their own reputation or
unfairly lower another's. This could be mitigated by having a reputation server incentivise …

社交网络中用户隐私推理与保护研究综述.

崔晓晖 - Journal of Computer Engineering & Applications, 2020 - search.ebscohost.com
如今微博和Twitter 等社交网络平台被广泛地用于交流, 创建在线社区并进行社交活动.
用户所发布的内容可以被推理出大量隐私信息, 这导致社交网络中针对用户的隐私推理技术的 …

[PDF][PDF] Variants of Group Signatures and Their Applications

L Garms - 2020 - pure.royalholloway.ac.uk
In public–key cryptography each entity generates a public and secret key. The public key is
published alongside the user's identity, whereas the secret key is kept private. Signature …

A Efficient Resource Utilization Flexible Trust Based Secure Signal Transmission in Pervasive Computing Environment

A Mohan, N Batra - Journal of Computational and Theoretical …, 2019 - ingentaconnect.com
In today's environment, pervasive computing plays important role to perform data
transmission between IoT objects in distributed environment which communicate, each other …

Information Security Group, Royal Holloway University of London, Egham, UK {Lydia. Garms. 2015, Elizabeth. Quaglia}@ rhul. ac. uk

L Garms - Progress in Cryptology–AFRICACRYPT 2019: 11th …, 2019 - books.google.com
A reputation system assigns a user or item a reputation value which can be used to evaluate
trustworthiness. Blömer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon …