Standout Papers

A survey of trust and reputation systems for online service provision 2005 2026 2012 2019 1.5k
  1. A survey of trust and reputation systems for online service provision (2005)
    Audun Jøsang, Roslan Ismail et al. Decision Support Systems

Citation Impact

Citing Papers

The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions1,2
1996
Octopus: An Edge-Fog Mutual Authentication Scheme
2016
Coping With Systems Risk: Security Planning Models for Management Decision Making1
1998 Standout
Detecting Fake Websites: The Contribution of Statistical Learning Theory1
2010
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations1
2010 Standout
Incorporating reliability measurements into the predictions of a recommender system
2012
Digital Identity: The effect of trust and reputation information on user judgement in the Sharing Economy
2018
A Secure Authentication Scheme for Telecare Medicine Information Systems
2010 Standout
Gorilla in our midst: An online behavioral experiment builder
2019 Standout
Making objective decisions from subjective data: Detecting irony in customer reviews
2012
A survey on opinion mining and sentiment analysis: Tasks, approaches and applications
2015 Standout
How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust
2010
Rotational chaos in dissipative systems
1988
Addressing cloud computing security issues
2010 Standout
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
Refinements of Miller's algorithm for computing the Weil/Tate pairing
2005
An Interactive Trust Model for Application Market of the Internet of Things
2014
A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids
2019 Standout
Algorithms at Work: The New Contested Terrain of Control
2019 Standout
Literature review of Industry 4.0 and related technologies
2018 Standout
IoT security: Review, blockchain solutions, and open challenges
2017 Standout
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
2015 Standout
Industry 4.0: state of the art and future trends
2018 Standout
Trust and reputation models comparison
2011
Adoption of O2O food delivery services in South Korea: The moderating role of moral obligation in meal preparation
2018 Standout
A Survey on Trust Management for Mobile Ad Hoc Networks
2010 Standout
Incorporating seller/buyer reputation-based system in blockchain-enabled emission trading application
2017
Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model
2014 Standout
Software Piracy in the Workplace: A Model and Empirical Test
2003 Standout
A survey of trust computation models for service management in internet of things systems
2016
A systematic literature review of blockchain-based applications: Current status, classification and open issues
2018 Standout
A survey of attack and defense techniques for reputation systems
2009 Standout
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
2019
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
TREPPS: A Trust-based Recommender System for Peer Production Services
2008
A survey of trust in computer science and the Semantic Web
2007
Q-rater: A collaborative reputation system based on source credibility theory
2008
Trusted P2P Transactions with Fuzzy Reputation Aggregation
2005
Cognitive radio networking and communications: an overview
2011 Standout
A survey of trust in social networks
2013 Standout
Guide to Elliptic Curve Cryptography
2004 Standout
A novel framework to detect and block DDoS attack at the application layer
2013
Trusted cognitive radio networking
2009
Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs
2008
Extracting trust information from security system of a service
2011
Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
2017 Standout
Blockchain technology and its relationships to sustainable supply chain management
2018 Standout
Attack against a batch zero-knowledge proof system
2012
Human Trust in Artificial Intelligence: Review of Empirical Research
2020 Standout
A Review on the Use of Blockchain for the Internet of Things
2018 Standout
A hybrid trust-enhanced collaborative filtering recommendation approach for personalized government-to-business e-services
2011
Recommender systems survey
2013 Standout
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications
2018 Standout
Trust management systems for wireless sensor networks: Best practices
2010
Advanced Key-Management Architecture for Secure SCADA Communications
2009
Microgrids: A review of technologies, key drivers, and outstanding issues
2018 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
SPECS: Secure and privacy enhancing communications schemes for VANETs
2010
Learning from class-imbalanced data: Review of methods and applications
2016 Standout
Resilient Distributed DC Optimal Power Flow Against Data Integrity Attack
2016
Beyond Deterrence: An Expanded View of Employee Computer Abuse1
2013 Standout
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
2011
Predicting trusts among users of online communities
2008
Blockchain-oriented dynamic modelling of smart contract design and execution in the supply chain
2019 Standout
Industrial Internet of Things: Challenges, Opportunities, and Directions
2018 Standout
Multidimensional credibility model for neighbor selection in collaborative recommendation
2008
Positioning and Presenting Design Science Research for Maximum Impact1
2013 Standout
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
2011 Standout
Trust network analysis with subjective logic
2006
A Case Study of Collaboration and Reputation in Social Web Search
2011
Information theoretic framework of trust modeling and evaluation for ad hoc networks
2006
A comparison of fraud cues and classification methods for fake escrow website detection
2009
Ridesharing: The state-of-the-art and future directions
2013 Standout
Internet of Things security: A survey
2017 Standout
RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects
2014
Silence in the crowd: The spiral of silence contributing to the positive bias of opinions in an online review system
2014
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
2008
Airbnb: disruptive innovation and the rise of an informal tourism accommodation sector
2013 Standout
A survey on concept drift adaptation
2014 Standout
Negotiation in Internet of Things
2016
Recommender systems
2012
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
2020 Standout
Recommender system application developments: A survey
2015 Standout
A Holistic Framework for Trust in Online Transactions
2011
Hidden semi-Markov model-based reputation management system for online to offline (O2O) e-commerce markets
2015
Periodic perturbations of the oscillatory CO oxidation on Pt(110): Model calculations
1992 StandoutNobel
Cyber-Physical Systems Security—A Survey
2017 Standout
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2008 Standout
A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks
2007
Elevating talents' experience through innovative artificial intelligence-mediated knowledge sharing: Evidence from an IT-multinational enterprise
2021 Standout
Integrating modified cuckoo algorithm and creditability evaluation for QoS-aware service composition
2017
Cyber security in the Smart Grid: Survey and challenges
2013
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
2018 Standout

Works of Colin Boyd being referenced

SKMA: a key management architecture for SCADA systems
2006
Protocols for Key Establishment and Authentication
2003
On the structure of the family of Cherry fields on the torus
1985
Batch verification of validity of bids in homomorphic e-auction
2005
An integrated approach to cryptographic mitigation of denial-of-services attacks
2011
Information Security and Privacy
2009
A survey of trust and reputation systems for online service provision
2005 Standout
Advances in Cryptology — ASIACRYPT 2001
2001
The importance of proofs of security for key establishment protocols
2005
A Survey of Trust and Reputation Systems for Online Service Provision
2007
Batch zero-knowledge proof and verification and its applications
2007
Rankless by CCL
2026