-
1
-
-
0347516666
-
The formal verification of a payment system
-
M. G. Hinchey and J. P. Bowen, editors, Springer-Verlag, Sept
-
R. Anderson. The formal verification of a payment system. In M. G. Hinchey and J. P. Bowen, editors, Industrial Strength Formal Methods, pages 43-52. Springer-Verlag, Sept. 1999.
-
(1999)
Industrial Strength Formal Methods
, pp. 43-52
-
-
Anderson, R.1
-
2
-
-
21844450653
-
A layered naming architecture for the internet
-
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A layered naming architecture for the internet. SIGCOMM Comput. Commun. Rev., 34(4):343-352, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.4
, pp. 343-352
-
-
Balakrishnan, H.1
Lakshminarayanan, K.2
Ratnasamy, S.3
Shenker, S.4
Stoica, I.5
Walfish, M.6
-
4
-
-
16244376852
-
Anonymity and software agents: An interdiscplinary challenge
-
F. Brazier, A. Oskamp, J. Prins, M. Schellekens, and N. Wijngaards. Anonymity and software agents: An interdiscplinary challenge. AI & Law, 1-2(12):137-157, 2004.
-
(2004)
AI & Law
, vol.1-2
, Issue.12
, pp. 137-157
-
-
Brazier, F.1
Oskamp, A.2
Prins, J.3
Schellekens, M.4
Wijngaards, N.5
-
5
-
-
46749154216
-
Identity Management in Agent Systems
-
N. Foukia, J. Seigneur, and M. Purvis, editors
-
D. de Groot and F. Brazier. Identity Management in Agent Systems. In N. Foukia, J. Seigneur, and M. Purvis, editors, Proceedings of the First International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE), pages 23-34, 2006.
-
(2006)
Proceedings of the First International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE)
, pp. 23-34
-
-
de Groot, D.1
Brazier, F.2
-
7
-
-
26444509427
-
Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
-
J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security ACNS 2005, of, Springer-Verlag
-
F. D. Garcia and J.-H. Hoepman. Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security (ACNS 2005), volume 3531 of LNCS, pages 364-377. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 364-377
-
-
Garcia, F.D.1
Hoepman, J.-H.2
-
8
-
-
46749118987
-
-
J. Grijpink and J. Prins. New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity. In Digital Anonymity and the Law, Tensions and Dimensions, Information technology and law series, 2, pages 249-269. T.M.C.Asser Press, 2003.
-
J. Grijpink and J. Prins. New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity. In Digital Anonymity and the Law, Tensions and Dimensions, Information technology and law series, volume 2, pages 249-269. T.M.C.Asser Press, 2003.
-
-
-
-
9
-
-
46749110372
-
-
Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002.
-
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
10
-
-
15344338536
-
Anonymous Communications for Mobile Agents
-
Proceeding of the 4 thInternational Workshop on Mobile Agents for Telecommunication Applications (MATA '02)a, of
-
L. Korba, R. Song, and G. Yee. Anonymous Communications for Mobile Agents. In Proceeding of the 4 thInternational Workshop on Mobile Agents for Telecommunication Applications (MATA '02)a, volume 2521 of LNCS, pages 171-181, 2002.
-
(2002)
LNCS
, vol.2521
, pp. 171-181
-
-
Korba, L.1
Song, R.2
Yee, G.3
-
11
-
-
0015672289
-
A note on the Confinement Problem
-
B. W. Lampson. A note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
12
-
-
34247196933
-
Untraceability of mobile agents
-
New York, NY, USA, ACM Press
-
R. Leszczyna and J. Górski. Untraceability of mobile agents. In AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pages 1233-1234, New York, NY, USA, 2005. ACM Press.
-
(2005)
AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
, pp. 1233-1234
-
-
Leszczyna, R.1
Górski, J.2
-
13
-
-
3242711938
-
Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing)
-
M. Luck, P. McBurney, and C. Preist. Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing). AgentLink, 2003.
-
(2003)
AgentLink
-
-
Luck, M.1
McBurney, P.2
Preist, C.3
-
14
-
-
46749140877
-
-
Master's thesis, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, August
-
Z. Maraikar. Resource and service discovery for mobile agent platforms. Master's thesis, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, August 2006.
-
(2006)
Resource and service discovery for mobile agent platforms
-
-
Maraikar, Z.1
-
15
-
-
33745302802
-
Scalable middleware environment for agent-based internet applications
-
Proceedings of the Workshop on State-of-the-Art in Scientific Computing PARA '04, of, Copenhagen, Denmark, June, Springer
-
B. Overeinder and F. Brazier. Scalable middleware environment for agent-based internet applications. In Proceedings of the Workshop on State-of-the-Art in Scientific Computing (PARA '04), volume 3732 of Lecture Notes in Computer Science, pages 675-679, Copenhagen, Denmark, June 2004. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3732
, pp. 675-679
-
-
Overeinder, B.1
Brazier, F.2
-
16
-
-
46749128900
-
Limits to Anonymity when Using Credentials
-
Proceedings of the 12th International Workshop on Security Protocols, Springer-Verlag
-
A. Pashalidis and C. Mitchell. Limits to Anonymity when Using Credentials. In Proceedings of the 12th International Workshop on Security Protocols, LNCS. Springer-Verlag, 2004.
-
(2004)
LNCS
-
-
Pashalidis, A.1
Mitchell, C.2
-
20
-
-
84949958302
-
A Distributed Light-weight Authentication Model for Ad-hoc Networks
-
The 4th International Conference on Information Security and Cryptology ICISC 2001, of, Springer
-
A. Weimerskirch and G. Thonet. A Distributed Light-weight Authentication Model for Ad-hoc Networks. In The 4th International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of LNCS, pages 341-354. Springer, 2002.
-
(2002)
LNCS
, vol.2288
, pp. 341-354
-
-
Weimerskirch, A.1
Thonet, G.2
|