-
1
-
-
1142304946
-
A verifiable, bidder-resolved auction protocol
-
Special Track on Privacy and Protection with Multi-Agent Systems
-
F. Brandt, A verifiable, bidder-resolved auction protocol, in: Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies (Special Track on Privacy and Protection with Multi-Agent Systems), 2002, pp. 18-25.
-
(2002)
Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies
, pp. 18-25
-
-
Brandt, F.1
-
3
-
-
84921441375
-
Bidtree ordering in IDA* combinatorial auction winner-determination with side constraints
-
J. Padget, O. Shehory, D. Parkes, N. Sadeh, W. Walsh (Eds.), Springer
-
J. Collins, G. Demir, M. Gini, Bidtree ordering in IDA* combinatorial auction winner-determination with side constraints, in: J. Padget, O. Shehory, D. Parkes, N. Sadeh, W. Walsh (Eds.), Agent Mediated Electronic Commerce IV, vol. LNAI2531, Springer, 2002, pp. 17-33.
-
(2002)
Agent Mediated Electronic Commerce IV
, vol.LNAI2531
, pp. 17-33
-
-
Collins, J.1
Demir, G.2
Gini, M.3
-
4
-
-
1142268543
-
Temporal strategies in a multi-agent contracting protocol
-
July
-
J. Collins, S. Jamison, M. Gini, B. Mobasher, Temporal strategies in a multi-agent contracting protocol, in: AAAI-97 Workshop on AI in Electronic Commerce, July 1997.
-
(1997)
AAAI-97 Workshop on AI in Electronic Commerce
-
-
Collins, J.1
Jamison, S.2
Gini, M.3
Mobasher, B.4
-
5
-
-
0348123473
-
A multi-agent negotiation testbed for contracting tasks with temporal and precedence constraints
-
J. Collins, W. Ketter, M. Gini, A multi-agent negotiation testbed for contracting tasks with temporal and precedence constraints, International Journal of Electronic Commerce 7 (1) (2002) 35-57.
-
(2002)
International Journal of Electronic Commerce
, vol.7
, Issue.1
, pp. 35-57
-
-
Collins, J.1
Ketter, W.2
Gini, M.3
-
6
-
-
0031655254
-
A market architecture for multi-agent contracting
-
ACM Press
-
J. Collins, B. Youngdahl, S. Jamison, B. Mobasher, M. Gini, A market architecture for multi-agent contracting, in: Proceedings of the Second International Conference on Autonomous Agents, ACM Press, 1998, pp. 285-292.
-
(1998)
Proceedings of the Second International Conference on Autonomous Agents
, pp. 285-292
-
-
Collins, J.1
Youngdahl, B.2
Jamison, S.3
Mobasher, B.4
Gini, M.5
-
9
-
-
0029220609
-
The design and implementation of a secure auction service
-
IEEE Computer Society Press, Oakland, CA
-
M. Franklin, M. Reiter, The design and implementation of a secure auction service, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 1995, pp. 2-14.
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Franklin, M.1
Reiter, M.2
-
10
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Washington, DC, November
-
M.J. Freedman, R. Morris, Tarzan: a peer-to-peer anonymizing network layer, in: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)
-
-
Freedman, M.J.1
Morris, R.2
-
11
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare (Ed.), Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, CA, August. Springer
-
M. Joye, G. Ateniese, J. Camenisch, G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, in: M. Bellare (Ed.), Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Lecture Notes in Computer Science, vol. 1880, Santa Barbara, CA, August 2000. Springer, pp. 255-270.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Joye, M.1
Ateniese, G.2
Camenisch, J.3
Tsudik, G.4
-
12
-
-
0037615406
-
Pkcs #7: Cryptographic message syntax standard
-
RSA Labs, November
-
RSA Laboratories. Pkcs #7: Cryptographic message syntax standard. Technical Report 1.5, RSA Labs, November 1993.
-
(1993)
Technical Report 1.5
-
-
-
13
-
-
0003629991
-
-
FIPS Publication 180-1, April
-
National Institute of Standards and Technology (NIST). Secure hash standard. FIPS Publication 180-1, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
14
-
-
0003508558
-
-
FIPS Publication 197, November
-
National Institute of Standards and Technology (NIST). Advanced encryption standard (aes). FIPS Publication 197, November 2001.
-
(2001)
Advanced Encryption Standard (aes)
-
-
-
15
-
-
1142304945
-
SAM: A flexible and secure auction architecture using trusted hardware
-
April
-
A. Perrig, S. Smith, D. Song, J.D. Tygar, SAM: A flexible and secure auction architecture using trusted hardware, in: First International Workshop on Internet Computing and E-Commerce (ICEC'Ol), April 2001, pp. 170-170.
-
(2001)
First International Workshop on Internet Computing and E-Commerce (ICEC'Ol)
, pp. 170-170
-
-
Perrig, A.1
Smith, S.2
Song, D.3
Tygar, J.D.4
-
17
-
-
0031683295
-
Personal security agent: Kqml-based pki
-
Minneapolis, MN, May
-
H. Qi, K. Sycara, T. Finin, Personal security agent: Kqml-based pki, in: Proceedings of the 2nd International Conference on Autonomous Agents and Multi Agent Systems, Minneapolis, MN, May 1998.
-
(1998)
Proceedings of the 2nd International Conference on Autonomous Agents and Multi Agent Systems
-
-
Qi, H.1
Sycara, K.2
Finin, T.3
-
18
-
-
8344274657
-
Security infrastructure for software agent societies
-
C. Castelfranchi, Y.-H. Tan (Eds.), Kluwer Academic Publishers
-
H. Qi, K. Sycara, Z. Su, Security infrastructure for software agent societies, in: C. Castelfranchi, Y.-H. Tan (Eds.), Trust and Deception in Virtual Societies, Kluwer Academic Publishers, 2001, pp. 139-156.
-
(2001)
Trust and Deception in Virtual Societies
, pp. 139-156
-
-
Qi, H.1
Sycara, K.2
Su, Z.3
-
19
-
-
0003367568
-
S/MIME version 3 message specification
-
Internet Engineering Task Force, June
-
Rarasdell, Editor, S/MIME version 3 message specification. Request for Comments: 2633, Internet Engineering Task Force, June 1999.
-
(1999)
Request for Comments
, vol.2633
-
-
Rarasdell1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21 (2) (1978) 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
MIT
-
R.L. Rivest, A. Shamir, D.A. Wagner, Time-lock puzzles and timed-release crypto, Technical Report MIT/LCS/TR-684, MIT, 1996.
-
(1996)
Technical Report
, vol.MIT-LCS-TR-684
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
23
-
-
7044262736
-
Specifying standard security mechanisms in multi-agent systems
-
Rino Falcone, K. Suzanne Barber, Larry Korba, Munindar P. Singh (Eds.), Trust, Reputation, ifs and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers, Springer
-
Monique Calisti Stefan Poslad, Patricia Charlton, Specifying standard security mechanisms in multi-agent systems, in: Rino Falcone, K. Suzanne Barber, Larry Korba, Munindar P. Singh (Eds.), Trust, Reputation, ifs and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers, Lecture Notes in Computer Science, vol. 2631, Springer, 2003, pp. 163-176.
-
(2003)
Lecture Notes in Computer Science
, vol.2631
, pp. 163-176
-
-
Poslad, M.C.S.1
Charlton, P.2
-
26
-
-
8344223234
-
-
OpenSSL Project team. OpenSSL. http://www.openssl.org/.
-
-
-
-
27
-
-
0034309389
-
Adding;security and trust to multia-gent systems
-
H. Chi Wong, K.P. Sycara, Adding;security and trust to multia-gent systems, Applied Artificial Intelligence 14 (9) (2000) 927-941.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 927-941
-
-
Wong, H.C.1
Sycara, K.P.2
|