skip to main content
10.1145/336992.337012acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article
Free Access

Enhancing privacy and trust in electronic communities

Published:01 November 1999Publication History
First page image

References

  1. 1.W. C. Hill, L. Stead, M. Rosenstein and G. Furnas, "Recommending and evaluating choices in a virtual community of use", proc. CHI'95, (1995), 194-201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.C. Avery and R. Zeckhauser, "Recommender systems for evaluating computer messages". Communications of the A CM 40, (1997), 88-89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.N. Glance, D. Arregui, and M. Dardenne, "Knowledge pump: supporting the flow and use of knowledge", in Information Technology for Knowledge Management. Eds. U. Borghoff and R. Pareschi, Springer (1998).Google ScholarGoogle Scholar
  4. 4.B. A. Huberman and T. Hogg, "Communities of practice: performance and evolution'', Computational and Mathematical Organization Theory 1, (1995), 73-92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.P. Samuelson, "Liability for Defective Electronic Information", Communications of the ACM 36, (1993), 21-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.M. Bellare and S. Micali, "Non-interactive oblivious transfer and applications", proc. Crypto '89, 547-557. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.S. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks", proc. IEEE Symposium on Security and Privacy (Oakland 1992), 72-84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.J. Camenisch and M. Stadler, "Efficient group signatures schemes for large groups", proc. Crypto '97, 410-424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R. Cramer, I. Damgaard and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols'', proc. Crypto '94, 174-187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.W. Difiie and M. Hellman, "New directions in cryptography", IEEE Transaction on Information Theory 22 (1976), 644- 654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications", proc. Eurocrypt '96, 143- 154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.T. E1Gamal, "A public key cryptosystsem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory 31 (1985), 469-472.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.R. Fagin, M. Naor, and P. Winkler, "Comparing information without leaking it", Communications of the ACM 39 (1996), 77-85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.U. Feige, A. Fiat and A. Shamir, "Zeroknowledge proofs of identity", Journal of Cryptology I (1988), 77-94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.S. Goldwasser and S. Micali, "Probabilistic public key encryption" Journal of Computer and System Sciences 28 (1984), 270-299.Google ScholarGoogle ScholarCross RefCross Ref
  16. 16.J. Kilian and E. Petrank, "Identity Escrow'', proc Crypto '98, 169-185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation", proc. ACM STOC, 1999, 245-254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.C. Schnorr, "Efficient signature generation by smart cards", Journal of Cryptology 4 (1991), 161-174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.F. Fukuyama, "Trust: the social virtues and the creation of prosperity", Free Press (~996).Google ScholarGoogle Scholar
  20. 20.The New York Times, April 8, 1999.Google ScholarGoogle Scholar
  21. 21.A. Zahavi and A. Zahavi, "The Handicap Principle: A Missing Piece of Darwin's Puzzle", Oxford Univ. Press (1997).Google ScholarGoogle Scholar
  22. 22.D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash", proc. Crypto '88, 319-327. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing privacy and trust in electronic communities

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      EC '99: Proceedings of the 1st ACM conference on Electronic commerce
                      November 1999
                      187 pages
                      ISBN:1581131763
                      DOI:10.1145/336992

                      Copyright © 1999 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 November 1999

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • Article

                      Acceptance Rates

                      Overall Acceptance Rate664of2,389submissions,28%

                      Upcoming Conference

                      EC '24
                      The 25th ACM Conference on Economics and Computation
                      July 8 - 11, 2024
                      New Haven , CT , USA

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader