메뉴 건너뛰기




Volumn 8, Issue 2, 2010, Pages 219-232

Anonymity services for multi-agent systems

Author keywords

Agent middleware; AgentScape; Anonymity; Multi agent systems

Indexed keywords

AGENT PLATFORM; ANONYMITY; ANONYMITY SERVICE; ANONYMOUS COMMUNICATION; ANONYMOUS PAYMENT; DISTRIBUTED AGENTS; E-COMMERCE; NEW APPROACHES; ON-DEMAND; PERFORMANCE MEASURE;

EID: 77649111174     PISSN: 15701263     EISSN: None     Source Type: Journal    
DOI: 10.3233/WIA-2010-0188     Document Type: Article
Times cited : (7)

References (33)
  • 4
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D.E. Denning and G.M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 6
    • 4244111455 scopus 로고    scopus 로고
    • Secure socket layer application program apparatus and method
    • Oct. 20, 890
    • T. Elgamal and K.E.B. Hickman. Secure socket layer application program apparatus and method, Oct. 20 1998. US Patent 5,825,890.
    • (1998) US Patent , vol.5 , pp. 825
    • Elgamal, T.1    Hickman, K.E.B.2
  • 8
    • 26444509427 scopus 로고    scopus 로고
    • Off-line Karma: A decentralized currency for peer-to-peer and grid applications
    • J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security (ACNS 2005), Springer-Verlag
    • F.D. Garcia and J.-H. Hoepman. Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security (ACNS 2005), volume 3531 of LNCS, pages 364-377. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3531 , pp. 364-377
    • Garcia, F.D.1    Hoepman, J.-H.2
  • 10
    • 16244410443 scopus 로고    scopus 로고
    • New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity
    • T. M. C. Asser Press
    • J. Grijpink and J.E.J. Prins. New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity. In Digital Anonymity and the Law, Tensions and Dimensions, Information technology and law series, volume 2, pages 249-269. T. M. C. Asser Press, 2003.
    • (2003) Digital Anonymity and the Law, Tensions and Dimensions, Information Technology and Law Series , vol.2 , pp. 249-269
    • Grijpink, J.1    Prins, J.E.J.2
  • 13
    • 15344338536 scopus 로고    scopus 로고
    • Anonymous communications for mobile agents
    • Proceeding of the 4th International Workshop on Mobile Agents for Telecommunication Applications (MATA'02)
    • L. Korba, R. Song, and G. Yee. Anonymous Communications for Mobile Agents. In Proceeding of the 4th International Workshop on Mobile Agents for Telecommunication Applications (MATA'02), volume 2521 of LNCS, pages 171-181, 2002.
    • (2002) LNCS , vol.2521 , pp. 171-181
    • Korba, L.1    Song, R.2    Yee, G.3
  • 14
    • 0015672289 scopus 로고
    • A note on the Confinement Problem
    • B. W. Lampson. A note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 17
    • 46749140877 scopus 로고    scopus 로고
    • Master's thesis Department of Computer Science Vrije Universiteit Amsterdam Amsterdam The Netherlands August
    • Z. Maraikar. Resource and service discovery for mobile agent platforms. Master's thesis, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, August 2006.
    • (2006) Resource and Service Discovery for Mobile Agent Platforms
    • Maraikar, Z.1
  • 18
    • 70349302945 scopus 로고    scopus 로고
    • PhD thesis, Computer Science Department, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, May
    • D.G.A. Mobach. Agent-Based Mediated Service Negotiation. PhD thesis, Computer Science Department, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, May 2007.
    • (2007) Agent-Based Mediated Service Negotiation
    • Mobach, D.G.A.1
  • 22
    • 46749128900 scopus 로고    scopus 로고
    • Limits to anonymity when using credentials
    • Proceedings of the 12th InternationalWorkshop on Security Protocols, Springer-Verlag
    • A. Pashalidis and C.J.Mitchell. Limits to Anonymity when Using Credentials. In Proceedings of the 12th InternationalWorkshop on Security Protocols, LNCS. Springer-Verlag, 2004.
    • (2004) LNCS
    • Pashalidis, A.1    Mitchell, C.J.2
  • 23
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • InternationalWorkshop on Design Issues in Anonymity and Unobservability, Springer
    • A. Pfitzmann and M. Kohntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In InternationalWorkshop on Design Issues in Anonymity and Unobservability, LNCS, pages 1-9. Springer, 2001.
    • (2001) LNCS , pp. 1-9
    • Pfitzmann, A.1    Kohntopp, M.2
  • 26
    • 77649118249 scopus 로고    scopus 로고
    • On anonymous electronic cash and crime
    • M. Mambo and Y. Zheng, editors, Proceedings of Information Security,Second International Workshop (ISW'99), Springer- Verlag
    • T. Sander and A. Ta-Shma. On Anonymous Electronic Cash and Crime. In M. Mambo and Y. Zheng, editors, Proceedings of Information Security, Second International Workshop (ISW'99), volume 1729 of LNCS, pages 202-206. Springer- Verlag, 1999.
    • (1999) LNCS , vol.1729 , pp. 202-206
    • Sander, T.1    Ta-Shma, A.2
  • 31
    • 70349306008 scopus 로고    scopus 로고
    • Security of distributed digital criminal dossiers
    • mar
    • M. Warnier, F.M.T. Brazier, and A. Oskamp. Security of distributed digital criminal dossiers. Journal of Software, 3(3):21-29, mar 2008.
    • (2008) Journal of Software , vol.3 , Issue.3 , pp. 21-29
    • Warnier, M.1    Brazier, F.M.T.2    Oskamp, A.3
  • 32
    • 84949958302 scopus 로고    scopus 로고
    • A distributed light-weight authentication model for ad-hoc networks
    • The 4th International Conference on Information Security and Cryptology (ICISC 2001) Springer
    • A. Weimerskirch and G. Thonet. A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In The 4th International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of LNCS, pages 341-354. Springer, 2002.
    • (2002) LNCS , vol.2288 , pp. 341-354
    • Weimerskirch, A.1    Thonet, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.