Open Access
Issue
E3S Web of Conf.
Volume 469, 2023
The International Conference on Energy and Green Computing (ICEGC’2023)
Article Number 00085
Number of page(s) 12
DOI https://doi.org/10.1051/e3sconf/202346900085
Published online 20 December 2023
  1. Smith, “The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver,” in IEEE Transactions on Computers, vol. C-29, no. 12, pp. 1104-1113, Dec. 1980, doi: 10.1109/TC.1980.1675516. [CrossRef] [Google Scholar]
  2. Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-88. [CrossRef] [Google Scholar]
  3. Zhu, Xiaoyang & Badr, Youakim. (2018). Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors. 18. 4215. 10.3390/s18124215. [CrossRef] [Google Scholar]
  4. Hardt, D. (2012). The OAuth 2.0 authorization framework. Internet Engineering Task Force (IETF). [Google Scholar]
  5. Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. “The knowledge complexity of interactive proof-systems.” SIAM Journal on Computing 18.1 (1989): 186-208. [CrossRef] [Google Scholar]
  6. Fotiou, N., Pittaras, I., Siris, V. A., Voulgaris, S., & Polyzos, G. C. (2021). OAuth 2.0 Authorization using Blockchain-based Tokens. [Google Scholar]
  7. Li, A. S., Safavi-Naini, R., & Fong, P. W. L. (2022). A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. [Google Scholar]
  8. Szczypiorski, K., Margasiński, I., Mazurczyk, W., Cabaj, K., & Radziszewski, P. (2008). TrustMAS: Trusted communication platform for multi-agent systems. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5332 LNCS(PART 2) [Google Scholar]
  9. Alderman, J., & Crampton, J. (2013). On the use of key assignment schemes in authentication protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS. [Google Scholar]
  10. Ahmed, I. H., Hanna, J. P., Fosong, E., & Albrecht, S. v. (2021). Towards Quantum-Secure Authentication and Key Agreement via Abstract Multi-Agent Interaction. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12946 LNAI. [Google Scholar]
  11. Ciszkowski, T., & Kotulski, Z. (2006). ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks. In X Krajowa Konferencja Zastosowań Kryptografii ENIGMA 2006. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.