|
Volumn 2, Issue , 2005, Pages 696-703
|
Applying secret sharing schemes to service reputation
|
Author keywords
Cryptography; Internet; Secret Sharing Schemes; Security; Service Oriented Computing; Service Reputation; Software Agents
|
Indexed keywords
DATA PROCESSING;
INTERNET;
PERFORMANCE;
SOFTWARE AGENTS;
TELECOMMUNICATION SERVICES;
COMPUTER SUPPORTED COOPERATIVE WORK;
CRYPTOGRAPHY;
CUSTOMER SATISFACTION;
FEEDBACK;
INFORMATION ANALYSIS;
SECURITY OF DATA;
SECRET SHARING SCHEMES;
SERVICE ORIENTED COMPUTING;
SERVICE REPUTATION;
SECURITY;
THRESHOLD SCHEMES;
COMPUTER SCIENCE;
INFORMATION SERVICES;
|
EID: 29144511649
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (3)
|
References (17)
|