메뉴 건너뛰기




Volumn , Issue , 2007, Pages 357-362

Organized anonymous agents

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; STABILIZERS (AGENTS);

EID: 46749111483     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2007.34     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 0347516666 scopus 로고    scopus 로고
    • The formal verification of a payment system
    • M. G. Hinchey and J. P. Bowen, editors, Springer-Verlag, Sept
    • R. Anderson. The formal verification of a payment system. In M. G. Hinchey and J. P. Bowen, editors, Industrial Strength Formal Methods, pages 43-52. Springer-Verlag, Sept. 1999.
    • (1999) Industrial Strength Formal Methods , pp. 43-52
    • Anderson, R.1
  • 4
    • 16244376852 scopus 로고    scopus 로고
    • Anonymity and software agents: An interdiscplinary challenge
    • F. Brazier, A. Oskamp, J. Prins, M. Schellekens, and N. Wijngaards. Anonymity and software agents: An interdiscplinary challenge. AI & Law, 1-2(12):137-157, 2004.
    • (2004) AI & Law , vol.1-2 , Issue.12 , pp. 137-157
    • Brazier, F.1    Oskamp, A.2    Prins, J.3    Schellekens, M.4    Wijngaards, N.5
  • 7
    • 26444509427 scopus 로고    scopus 로고
    • Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
    • J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security ACNS 2005, of, Springer-Verlag
    • F. D. Garcia and J.-H. Hoepman. Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security (ACNS 2005), volume 3531 of LNCS, pages 364-377. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3531 , pp. 364-377
    • Garcia, F.D.1    Hoepman, J.-H.2
  • 8
    • 46749118987 scopus 로고    scopus 로고
    • J. Grijpink and J. Prins. New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity. In Digital Anonymity and the Law, Tensions and Dimensions, Information technology and law series, 2, pages 249-269. T.M.C.Asser Press, 2003.
    • J. Grijpink and J. Prins. New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity. In Digital Anonymity and the Law, Tensions and Dimensions, Information technology and law series, volume 2, pages 249-269. T.M.C.Asser Press, 2003.
  • 9
    • 46749110372 scopus 로고    scopus 로고
    • Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002
    • C. Kaufman, R. Perlman, and M. Speciner. Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002.
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 10
    • 15344338536 scopus 로고    scopus 로고
    • Anonymous Communications for Mobile Agents
    • Proceeding of the 4 thInternational Workshop on Mobile Agents for Telecommunication Applications (MATA '02)a, of
    • L. Korba, R. Song, and G. Yee. Anonymous Communications for Mobile Agents. In Proceeding of the 4 thInternational Workshop on Mobile Agents for Telecommunication Applications (MATA '02)a, volume 2521 of LNCS, pages 171-181, 2002.
    • (2002) LNCS , vol.2521 , pp. 171-181
    • Korba, L.1    Song, R.2    Yee, G.3
  • 11
    • 0015672289 scopus 로고
    • A note on the Confinement Problem
    • B. W. Lampson. A note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 13
    • 3242711938 scopus 로고    scopus 로고
    • Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing)
    • M. Luck, P. McBurney, and C. Preist. Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing). AgentLink, 2003.
    • (2003) AgentLink
    • Luck, M.1    McBurney, P.2    Preist, C.3
  • 14
    • 46749140877 scopus 로고    scopus 로고
    • Master's thesis, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, August
    • Z. Maraikar. Resource and service discovery for mobile agent platforms. Master's thesis, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, August 2006.
    • (2006) Resource and service discovery for mobile agent platforms
    • Maraikar, Z.1
  • 15
    • 33745302802 scopus 로고    scopus 로고
    • Scalable middleware environment for agent-based internet applications
    • Proceedings of the Workshop on State-of-the-Art in Scientific Computing PARA '04, of, Copenhagen, Denmark, June, Springer
    • B. Overeinder and F. Brazier. Scalable middleware environment for agent-based internet applications. In Proceedings of the Workshop on State-of-the-Art in Scientific Computing (PARA '04), volume 3732 of Lecture Notes in Computer Science, pages 675-679, Copenhagen, Denmark, June 2004. Springer.
    • (2004) Lecture Notes in Computer Science , vol.3732 , pp. 675-679
    • Overeinder, B.1    Brazier, F.2
  • 16
    • 46749128900 scopus 로고    scopus 로고
    • Limits to Anonymity when Using Credentials
    • Proceedings of the 12th International Workshop on Security Protocols, Springer-Verlag
    • A. Pashalidis and C. Mitchell. Limits to Anonymity when Using Credentials. In Proceedings of the 12th International Workshop on Security Protocols, LNCS. Springer-Verlag, 2004.
    • (2004) LNCS
    • Pashalidis, A.1    Mitchell, C.2
  • 20
    • 84949958302 scopus 로고    scopus 로고
    • A Distributed Light-weight Authentication Model for Ad-hoc Networks
    • The 4th International Conference on Information Security and Cryptology ICISC 2001, of, Springer
    • A. Weimerskirch and G. Thonet. A Distributed Light-weight Authentication Model for Ad-hoc Networks. In The 4th International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of LNCS, pages 341-354. Springer, 2002.
    • (2002) LNCS , vol.2288 , pp. 341-354
    • Weimerskirch, A.1    Thonet, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.