Sciweavers

181 search results - page 14 / 37
» Anonymity services for multi-agent systems
Sort
View
SAC
2008
ACM
13 years 8 months ago
Supporting the development of context-aware agent-based systems for mobile networks
Distributed applications involving mobile devices interconnected by wireless networks may benefit both from multiagent technology and context-aware programming techniques. This ar...
José Viterbo Filho, Marcelo Andrade da Gama...
FM
1999
Springer
93views Formal Methods» more  FM 1999»
14 years 27 days ago
Group Principals and the Formalization of Anonymity
We introduce the concept of a group principal and present a number of different classes of group principals, including threshold-group-principals. These appear to naturally usefu...
Paul F. Syverson, Stuart G. Stubblebine
ICAS
2009
IEEE
197views Robotics» more  ICAS 2009»
14 years 3 months ago
Web QoE Evaluation in Multi-agent Networks: Validation of ITU-T G.1030
— User’s requirements have become a key factor for any Quality of Service (QoS) management model to succeed. The advent and rise of new broadband services and network architect...
Eva Ibarrola, Fidel Liberal, Ianire Taboada, Rodri...
MIDDLEWARE
2010
Springer
13 years 7 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
ISPEC
2007
Springer
14 years 2 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao