Electronic commerce: a manager's guide
Electronic commerce: a manager's guide
Mutual protection of co-operating agents
Secure Internet programming
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
A literature review and classification of electronic commerce research
Information and Management
MAgNET: Mobile Agents for Networked Electronic Trading
IEEE Transactions on Knowledge and Data Engineering
A flexible, agent-based ICT architecture for virtual enterprises
Computers in Industry
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
SAFE: secure agent roaming for e-commerce
Computers and Industrial Engineering - 26th International conference on computers and industrial engineering
Mediating Negotiations in a Virtual Enterprise via Mobile Agents
AIWORC '00 Proceedings of the Academia/Industry Working Conference on Research Challenges
Security in mobile agent systems
Security in mobile agent systems
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Mobile agent strategies for the provision of public goods: An experimental study
Electronic Commerce Research and Applications
Hi-index | 0.00 |
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. E-Commerce or electronic commerce is born along with the Internet. In this application, security is crucial since we can consider that any application will not be useful without doing secure transactions. This paper is consisted of two sections: the first section some definitions like e-commerce, mobile agents which are special types of agents have been presented and the second section begins with the main security issues related to the mobile agent paradigm, and techniques for keeping the mobile agent platform and the agent itself secure against each other.