The Michigan Internet AuctionBot: a configurable auction server for human and software agents
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Timestamps in key distribution protocols
Communications of the ACM
A note on the confinement problem
Communications of the ACM
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Untraceability of mobile agents
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Anonymity and software agents: an interdisciplinary challenge
Artificial Intelligence and Law
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Web service access management for integration with agent systems
Proceedings of the 2008 ACM symposium on Applied computing
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
Limits to anonymity when using credentials
SP'04 Proceedings of the 12th international conference on Security Protocols
Off-Line karma: a decentralized currency for peer-to-peer and grid applications
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
Strategic pseudonym change in agent-based e-commerce
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Hi-index | 0.00 |
Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions. This paper proposes and analyzes a new approach for anonymous communication of agents based on the use of handles as pseudonyms. A novel naming scheme is presented that can be used by agent platforms to provide automatic anonymity of communication for all agents on its platform, or, alternatively, to provide anonymity on demand. The paper furthermore introduces new approaches that provide authentication and anonymous payment schemes for agents. Performance measures for an anonymity service implemented for the AgentScape platform provides some insight in the overhead involved. This paper is an extension and revision of a paper previously presented at the Third International Symposium on Information Assurance and Security [30].