메뉴 건너뛰기




Volumn 38, Issue 2, 2011, Pages 1233-1240

Using asymmetric keys in a certified trust model for multiagent systems

Author keywords

Asymmetric keys; Multiagent systems; Reputation; Trust

Indexed keywords

ASYMMETRIC KEY; DIRECT INTERACTIONS; PRIVATE KEY; REPUTATION; SERVICE AGENTS; SERVICE PROVIDER AGENTS; TRUST; TRUST MODELS; WEAK POINTS;

EID: 77957264388     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.05.016     Document Type: Conference Paper
Times cited : (8)

References (26)
  • 6
    • 0000693203 scopus 로고    scopus 로고
    • The social structure of trust
    • V. Buskens The social structure of trust Social Networks 20 1998 265 298
    • (1998) Social Networks , vol.20 , pp. 265-298
    • Buskens, V.1
  • 9
    • 77957287077 scopus 로고    scopus 로고
    • [Retrievedfrom15.03.2010] Ebay Inc
    • Ebay (2010). Ebay Inc. [Retrieved from 15.03.2010].
    • (2010) Ebay
  • 14
    • 44149093434 scopus 로고
    • Reputation and imperfect information
    • D.M. Kreps, and R. Wilson Reputation and imperfect information Journal of Economic Theory 27 2 1982 253 279
    • (1982) Journal of Economic Theory , vol.27 , Issue.2 , pp. 253-279
    • Kreps, D.M.1    Wilson, R.2
  • 16
    • 0032507958 scopus 로고    scopus 로고
    • Evolution of indirect reciprocity by image scoring
    • M.A. Nowak, and K. Sigmund Evolution of indirect reciprocity by image scoring Nature 393 1998 573 577
    • (1998) Nature , vol.393 , pp. 573-577
    • Nowak, M.A.1    Sigmund, K.2
  • 17
    • 0035510528 scopus 로고    scopus 로고
    • Social mental shaping: Modelling the impact of sociality on the mental states of autonomous agents
    • P. Panzarasa, N.R. Jennings, and T. Norman Social mental shaping: Modelling the impact of sociality on the mental states of autonomous agents Computational Intelligence 4 17 2001 738 782
    • (2001) Computational Intelligence , vol.4 , Issue.17 , pp. 738-782
    • Panzarasa, P.1    Jennings, N.R.2    Norman, T.3
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 1978 120 126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.