6, pages 1769–1777, Washington, DC, USA. IEEE
Comp. Soc.
Birk, A. (2000). Boosting cooperation by evolving trust.
Applied Artificial Intelligence, 14(8):769–784.
Damiani, E., di Vimercati, D. C., Paraboschi, S., Samarati,
P., and Violante, F. (2002). A reputation-based ap-
proach for choosing reliable resources in peer-to-peer
networks. In CCS ’02: Proc. of the 9th ACM Conf. on
Computer and communications security, pages 207–
216, New York, NY, USA. ACM Press.
Dellarocas, C. (2003). The digitization of word of mouth:
Promise and challenges of online feedback mecha-
nisms. Management Science, 49(10):1407–1424.
Dholakia, R. R. (2004). Editorial: electronic markets in the
post-euphoric phase: Relationships, values and behav-
iors. Telematic Information, 21(2):115–121.
Dursch, A. and Yen, D. C. (2004). Bluetooth technology:
An exploratory study of the analysis and implementa-
tion frameworks. Computer Standards and Interfaces,
26(4):263–277.
Falcone, R. and Castelfranchi, C. (2001a). Social trust:
a cognitive approach. Kluwer Academic Publishers,
Norwell, MA, USA.
Falcone, R. and Castelfranchi, C. (2001b). The socio-
cognitive dynamics of trust: Does trust create trust? In
Proc. of the Workshop on Deception, Fraud, and Trust
in Agent Societies held during the Autonomous Agents
Conf., pages 55–72, London, UK. Springer-Verlag.
Han, P., Xie, B., Yang, F., and Shen, R. (2004). A scal-
able p2p recommender system based on distributed
collaborative filtering. Expert Systems with Applica-
tion, 27(2):203–210.
http://www.bluetooth.com (2006).
http://www.ebay.com (2006).
http://www.napster.com (2006).
http://www.uwbforum.org (2006).
Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. (2004).
Fire: An integrated trust and reputation model for
open multi-agent systems. In ECAI 2004: Proc. of
the 16th Europ. Conf. on Artificial intelligence, pages
18–22. IOS Press.
Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H.
(2003). The eigentrust algorithm for reputation man-
agement in p2p networks. In WWW ’03: Proc. of the
12th Int. Conf. on World Wide Web, pages 640–651,
New York, NY, USA. ACM Press.
Lam, K. M. and Leung, H. F. (2005). A trust/honesty
model in multiagent semi-competitive environments.
In PRIMA 2004: Proc. of the 17th Pacific rim Int.
Workshop, volume Lecture Notes in Computer Sci-
ence Vol. 3371, pages 128–147. Springer.
McLaughlin, M. R. and Herlocker, J. L. (2004). A collab-
orative filtering algorithm and evaluation metric that
accurately model the user experience. In SIGIR ’04:
Proc. of the 27th Int. Conf. on Research and develop-
ment in information retrieval, pages 329–336. ACM
Press.
Mui, L., Mohtashemi, M., and Halberstadt, A. (2002). No-
tions of reputation in multi-agents systems: a review.
In AAMAS ’02: Proc. of the first Int. Joint Conf. on Au-
tonomous agents and multiagent systems, pages 280–
287, New York, NY, USA. ACM Press.
NIST/NSA (2002). Fips 180-2. secure hash standard (shs).
NIST/NSA.
Pfitzmann, A., Pfitzmann, B., Schunter, M., and Waidner,
M. (1997). Trusting mobile user devices and security
modules. Computer, 30(2):61–68.
Ramchurn, S. D., Huynh, D., and Jennings, N. R. (2004).
Trust in multi-agent systems. Knowl. Eng. Rev.,
19(1):1–25.
Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman,
E. (2000). Reputation systems. Commun. ACM,
43(12):45–48.
Rijsbergen, C. J. V. (1979). Information Retrieval. Butter-
worth.
Rivest, R. L. (1992). The md5 message-digest algorithm.
Network Working Group and RSA Data Security, Inc.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
method for obtaining digital signatures and public-key
cryptosystems. Commun. ACM, 21(2):120–126.
Sabater, J. and Sierra, C. (2001). Regret: reputation in
gregarious societies. In AGENTS ’01: Proc. of the
5th Int. Conf. on Autonomous agents, pages 194–195,
New York, NY, USA. ACM Press.
Sen, S. and Sajja, N. (2002). Robustness of reputation-
based trust: boolean case. In AAMAS ’02: Proc. of the
1st Int. Joint Conf. on Autonomous agents and multi-
agent systems, pages 288–293, New York, NY, USA.
ACM Press.
Shaked, Y. and Wool, A. (2005). Cracking the bluetooth
pin. In MobiSys ’05: Proc. of the 3rd Int. Conf. on
Mobile systems, applications, and services, pages 39–
50, New York, NY, USA. ACM Press.
Srivihok, A. and Sukonmanee, P. (2005). E-commerce in-
telligent agent: personalization travel support agent
using q learning. In ICEC ’05: Proc. of the 7th Int.
Conf. on Electronic commerce, pages 287–292. ACM
Press.
Tan, Y.-H. and Thoen, W. (2000). An outline of a trust
model for electronic commerce. Applied Artificial In-
telligence, 14(8):849–862.
Xiong, L. and Liu, L. (2004). Peertrust: Supporting
reputation-based trust for peer-to-peer electronic com-
munities. IEEE Transactions on Knowledge and Data
Engineering, 16(7):843–857.
Yamamoto, H., Ishida, K., and Ohta, T. (2004). Modeling
reputation management system on online c2c market.
Comput. Math. Organ. Theory, 10(2):165–178.
Zacharia, G. and Maes, P. (2000). Trust management
through reputation mechanisms. Applied Artificial In-
telligence, 14(9):881–907.
ICE-B 2006 - INTERNATIONAL CONFERENCE ON E-BUSINESS
104