{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:54:26Z","timestamp":1725566066847},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232223"},{"type":"electronic","value":"9783540300823"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30082-3_6","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T17:37:32Z","timestamp":1284658652000},"page":"73-84","source":"Crossref","is-referenced-by-count":1,"title":["Agent-Based Communication Security"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o Paulo","family":"Piment\u00e3o","sequence":"first","affiliation":[]},{"given":"Pedro A. C.","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Amaral","sequence":"additional","affiliation":[]},{"given":"Adolfo","family":"Steiger-Gar\u00e7\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"21","key":"6_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"2","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L.M.: A method for obtaining digital signatures and publickey cryptosystems. Communications of the ACM\u00a02(21), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"6_CR3","unstructured":"Webopedia, Moore\u2019s law (1998), http:\/\/www.webopedia.com\/TERM\/M\/Moores_Law.html"},{"key":"6_CR4","unstructured":"Mann, C.C.: The End of Moore\u2019s Law? Technology Review (2000), http:\/\/www.technologyreview.com\/articles\/mann0500.asp"},{"key":"6_CR5","unstructured":"R\u00f3nai, C.: O Globo 08\/2000 (2000), http:\/\/www.almaden.ibm.com\/projects\/oglobo.htm"},{"key":"6_CR6","unstructured":": NCIX, Counterintelligence News & Developments. Hidden in Plain Sight-Steganography 1998, Office of the National Counterintelligence Executive.\u00a02 (1998)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Judge, J.C.: Steganography: Past, Present, Future, SANS - SysAdmin, Audit, Network, Security (2001), http:\/\/www.sans.org\/rr\/steg\/steganography4.php","DOI":"10.2172\/15006450"},{"key":"6_CR8","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. In: DIMACS, New Jersey, USA, p. 21 (1997)"},{"key":"6_CR9","series-title":"(LLNCS)","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996 (LLNCS), vol.\u00a01174, Springer, Heidelberg (1996)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM\u00a042(2) (1999)","DOI":"10.1145\/293411.293443"},{"key":"6_CR11","unstructured":"Bosselaers, A.: Comparative performance of hash functions, http:\/\/www.esat.kuleuven.ac.be\/~bosselae\/fast.html"},{"key":"6_CR12","unstructured":"Barreto, P.: The Hashing Function Lounge (2000), http:\/\/planeta.terra.com.br\/informatica\/paulobarreto\/hflounge.html"},{"key":"6_CR13","first-page":"213","volume-title":"Department of Sociology","author":"D. Gambetta","year":"2000","unstructured":"Gambetta, D.: Can We Trust Trust? in Trust: Making and Breaking Cooperative Relations, electronic edition. In: Gambetta, D. (ed.) Department of Sociology, pp. 213\u2013237. University of Oxford, Oxford (2000), http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"6_CR14","unstructured":"Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. In: in Department of Electrical Engineering and Computer Science 2002, Massachusetts Institute of Technology, Massachusetts, p. 139 (2002)"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2585925","volume":"92","author":"E. Ostrom","year":"1998","unstructured":"Ostrom, E.: A Behavioral Approach to the Rational-Choice Theory of Collective Action. American Political Science Review\u00a092(1), 1\u201322 (1998)","journal-title":"American Political Science Review"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1086\/228311","volume":"91","author":"M. Granovetter","year":"1985","unstructured":"Granovetter, M.: Economic Action and Social Structure: The Problem of Embeddedness. American Journal of Sociology\u00a091, 481\u2013510 (1985)","journal-title":"American Journal of Sociology"},{"key":"6_CR17","unstructured":"Willmott, S., et al.: Agentcities Network Architecture Recommendation, Agentcities Task Force (2002)"},{"key":"6_CR18","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: JADE - A FIPA-compliant agent framework. In: 4th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents, London, UK (1999)"},{"key":"6_CR19","unstructured":"FIPA00061, FIPA ACL Message Structure Specification. In: Foundation for Intelligent Physical Agents (2000)"}],"container-title":["Lecture Notes in Computer Science","Multiagent System Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30082-3_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:40:01Z","timestamp":1605760801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30082-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232223","9783540300823"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30082-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}