{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:45:33Z","timestamp":1648590333207},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commerce Res"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s10660-006-8675-9","type":"journal-article","created":{"date-parts":[[2006,9,28]],"date-time":"2006-09-28T02:29:49Z","timestamp":1159410589000},"page":"227-263","source":"Crossref","is-referenced-by-count":3,"title":["Reputation management and signature delegation: A distributed approach"],"prefix":"10.1007","volume":"6","author":[{"given":"Omaima","family":"Bamasak","sequence":"first","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8675_CR1","doi-asserted-by":"crossref","unstructured":"Bamasak, O., & Zhang, N. (2004). A secure method for signature delegation to mobile agents. In Proceedings of the 19th ACM Symposium on Applied Computing, (pp. 813\u2013818). Nicosia, Cyprus: ACM Press.","DOI":"10.1145\/967900.968067"},{"key":"8675_CR2","doi-asserted-by":"crossref","unstructured":"Bamasak, O., & Zhang, N. (2004). A secure proxy signature protocol for agent-based M-commerce applications. In Proceedings of the 9th IEEE Symposium on Computer and Communications, (pp. 399\u2013406). Egypt, Alexandria: IEEE Computer Society.","DOI":"10.1109\/ISCC.2004.1358437"},{"key":"8675_CR3","doi-asserted-by":"crossref","unstructured":"Cachin, C. (2001). Distributing trust on the internet. In Proceedings of International Conference on Dependable Systems and Networks (DSN2001), Gteborg. (pp. 183\u2013192). Sweden, IEEE Computer Society.","DOI":"10.1109\/DSN.2001.941404"},{"key":"8675_CR4","unstructured":"Desmedt, Y. (1988). Society and group oriented cryptograph: a new concept. In Advances in Cryptology, proceedings of Crypto\u2032 87, Lecture Notes in Computer Science, vol. 293 (pp. 120\u2013127). Springer-Verlag."},{"key":"8675_CR5","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., & Frankel, Y. (1992). Shared generation of authenticators and signatures. In Advances in Cryptology, Proceedings of Crypto\u2019 91, Lecture Notes in Computer Science, Vol. 576 (pp. 457\u2013469). Springer-Verlag.","DOI":"10.1007\/3-540-46766-1_37"},{"key":"8675_CR6","unstructured":"eBay. http:\/\/www.ebay.com ."},{"key":"8675_CR7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, 31, 469\u2013472.","journal-title":"IEEE Transaction on Information Theory"},{"key":"8675_CR8","doi-asserted-by":"crossref","unstructured":"Gamage, C., Leiwo, J., & Zheng, Y. (1999). Encrypted message authentication by firewalls. In Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC\u201999), Lecture Notes in Computer Science, Vol. 1560 (pp. 69\u201381). Springer-Verlag.","DOI":"10.1007\/3-540-49162-7_6"},{"key":"8675_CR9","doi-asserted-by":"crossref","unstructured":"Harn, L. (1994). Group oriented (t, n) digital signature scheme and digital multisignature. IEE Proceedings\u2014Computers and Digital Techniques, 141(5), 307\u2013313.","DOI":"10.1049\/ip-cdt:19941293"},{"key":"8675_CR10","doi-asserted-by":"crossref","unstructured":"Hohl, F. (1998). Time limited blackbox security : Protecting mobile agents from malicious hosts. In Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419 (pp. 92\u2013113). Springer-Verlag.","DOI":"10.1007\/3-540-68671-1_6"},{"key":"8675_CR11","doi-asserted-by":"crossref","unstructured":"Hsu, C., Wu, T., & Wu., T. (2003). Improvement of threshold proxy signature scheme. In Applied Mathematics and Computation, Vol. 136, (pp. 315\u2013321) Elsevier Science.","DOI":"10.1016\/S0096-3003(02)00043-7"},{"key":"8675_CR12","unstructured":"ITU-T. (1997). ITU-T recommendation X.500. ISO\/IEC 9594-1, Information technology\u2014Open Systems Interconnection\u2014The Directory: Overview of concepts, models and services."},{"key":"8675_CR13","unstructured":"J\u00f8sang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia."},{"key":"8675_CR14","doi-asserted-by":"crossref","unstructured":"Kim, S., Park, S., & Won, D. (1997). Proxy signatures, revisited. In Proceedings of the International Conference on Information and Communications Security (ICICS\u2019 97), Lecture Notes in Computer Science, Vol. 1334 (pp. 223\u2013232). Springer-Verlag.","DOI":"10.1007\/BFb0028478"},{"key":"8675_CR15","unstructured":"Kim, H., Baek, J., Lee, B., & Kim, K. (2001). Secret computation with secrets for mobile agent using one-time proxy signature. In Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS2001), (pp. 845\u2013850) Osio, Japan."},{"key":"8675_CR16","doi-asserted-by":"crossref","unstructured":"Kotzanikolaou, P., Burmester, M., & Chrissikopoulos, V. (2000). Secure transactions with mobile agents in hostile environments. In proceedings of the Fifth Australian Conference on Information Security and Privacy (ACISP 2000), Lecture Notes in Computer Science, Vol. 1841 (pp. 289\u2013297). Springer-Verlag.","DOI":"10.1007\/10718964_24"},{"key":"8675_CR17","doi-asserted-by":"crossref","unstructured":"Langford, S. (1995). Threshold DSS signatures without a trusted party. In Advances in Cryptology, Proceedings of Crypto\u2019 95, Lecture Notes in Computer Science, Vol. 963 (pp. 397\u2013409). Springer-Verlag.","DOI":"10.1007\/3-540-44750-4_32"},{"key":"8675_CR18","unstructured":"Lee, B., Kim, H., & Kim, K. (2001). Strong proxy signature and its applications. In Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS2001), (pp. 603\u2013608) Osio, Japan."},{"key":"8675_CR19","unstructured":"Li, C., Hwang, T., & Lee, N. (1995). (t, n) threshold signature scheme based on discrete logarithm. In Proceedings of Eurocrypt\u2019 94, Springer-Verlag."},{"key":"8675_CR20","doi-asserted-by":"crossref","unstructured":"Malaga, R. (2001). Web-based reputation management systems : Problems and suggested solutions. In Electronic Commerce Research, Vol. 1 (pp. 403\u2013417). Kluwer.","DOI":"10.1023\/A:1011557319152"},{"key":"8675_CR21","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy Signatures for Delegating Signing operation. In Proceedings of the Third ACM Conference on Computers and Communications Security, (pp. 48\u201357).","DOI":"10.1145\/238168.238185"},{"key":"8675_CR22","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundamentals, E79-A, 1338\u20131353.","journal-title":"IEICE Trans. Fundamentals"},{"key":"8675_CR23","doi-asserted-by":"crossref","unstructured":"Mu, Y., & Varadharajan, V. (2000). Distributed Signcryption. In Proceedings of INDOCRYPT 2000, Lecture Notes in Computer Science, Vol. 1977, (pp. 155\u2013164). Springer Verlag.","DOI":"10.1007\/3-540-44495-5_14"},{"key":"8675_CR24","unstructured":"NIST. (1995). Secure hash standard. National Institute of Standard and Technology, Federal Information Processing Standards Publication, 180-1."},{"key":"8675_CR25","unstructured":"NIST. (1999). Data encryption standard. National Institute of Standard and Technology, Federal Information Processing Standards Publication 46-3."},{"key":"8675_CR26","unstructured":"NIST. (2000). Digital signature standard. National Institute of Standard and Technology, Federal Information Processing Standards Publication 186-2."},{"key":"8675_CR27","unstructured":"NIST. (2001). Advanced encryption standard. National Institute of Standard and Technology, Federal Information Processing standards Publication 197."},{"issue":"4","key":"8675_CR28","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/227210.227228","volume":"39","author":"M. K. Reiter","year":"1996","unstructured":"Reiter, M. K. (1996). Distributing trust with the rampart toolkit. Communications of the ACM, 39(4), 71\u201374.","journal-title":"Communications of the ACM"},{"key":"8675_CR29","doi-asserted-by":"crossref","unstructured":"Sander, T., & Tschudin, C. (1998). Protecting mobile agents against malicious hosts. In Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419 (pp. 44\u201360). Springer-Verlag.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"8675_CR30","doi-asserted-by":"crossref","unstructured":"Shamir, A. (1979). How to Share a secret. Technical report, Massachusetts Institute of Technology, MIT\/LCS\/TM-134.","DOI":"10.1145\/359168.359176"},{"key":"8675_CR31","unstructured":"Stallings, W. (2000). Network security essentials : Applications and standards. Prentice Hall. ISBN: 0130160938."},{"issue":"5","key":"8675_CR32","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1049\/ip-cdt:19990647","volume":"146","author":"H. Sun","year":"1999","unstructured":"Sun, H., Lee, N., & Hwang, T. (1999). Threshold proxy signatures. IEE Proc.\u2014Computer & Digital Techniques, 146(5), 259\u2013263.","journal-title":"IEE Proc.\u2014Computer & Digital Techniques"},{"key":"8675_CR33","doi-asserted-by":"crossref","unstructured":"Tzeng, S., Hwang, M., & Yang, C. (2004). An improvement of nonrepudiable threshold proxy signature scheme with known signers. In Computer & security, Vol. 23, (pp. 174\u2013178). Eelsevier Science.","DOI":"10.1016\/j.cose.2003.12.001"},{"key":"8675_CR34","unstructured":"Wilhelm, U. (1997). Cryptographically protected objects. Technical report, Ecole Polytechnique Federale de Lausanne, Switzerland."},{"key":"8675_CR35","unstructured":"Xiong, L., & Liu, L. (2003). A reputation-based trust model for Peer-to-Peer eCommerce communities. In Proceedings of the IEEE International Conference on E-Commerce (CEC\u201903) (pp. 275\u2013284). IEEE Computer Society."},{"key":"8675_CR36","unstructured":"Yahoo! Auctions, http:\/\/auctions.yahoo.com ."},{"key":"8675_CR37","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"14","author":"G. Zacharia","year":"2000","unstructured":"Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14, 881\u2013908.","journal-title":"Applied Artificial Intelligence"},{"key":"8675_CR38","unstructured":"Zhang, K. (1997). Threshold proxy signature schemes. In Proceedings of the 1997 Information Security Workshop, Japan, (pp. 191\u2013197)."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8675-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-006-8675-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8675-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:49:52Z","timestamp":1559249392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-006-8675-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":38,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["8675"],"URL":"https:\/\/doi.org\/10.1007\/s10660-006-8675-9","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}