Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Communications of the ACM
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Wireless trust: conceptual and operational definition
International Journal of Mobile Communications
Enterprise mobility: concept and examples
International Journal of Mobile Communications
The critical role of consumer behaviour research in mobile commerce
International Journal of Mobile Communications
Mobile communications and mobile services
International Journal of Mobile Communications
A study on direction of development of business to customer m-commerce
International Journal of Mobile Communications
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
An architecture for agent-based mobile Supply Chain Event Management
International Journal of Mobile Communications
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
The proactive intrusion prevention for Wireless Local Area Network
International Journal of Mobile Communications
A Bluetooth intelligent e-healthcare system: analysis and design issues
International Journal of Mobile Communications
Hi-index | 0.00 |
This paper presents a proxy signature scheme to protect mobile agents from malicious agent hosts by using the proposed self-certified pairing-based public key cryptosystem. The proposed proxy signature scheme can protect a user's privacy as stipulated in the contract. In addition, based on the proposed cryptosystem, we employ the proposed proxy signature scheme to design a proxy-authenticated encryption scheme so that the signature in the contract will satisfy the user's restrictions and achieve non-repudiation of servers. As far as mobile agent security is concerned, the proposed schemes are to satisfy the security requirements of confidentiality, integrity, authenticity, and non-repudiation for mobile agents. We believe that the proposed mobile agent security schemes are suitable for practical applications in mobile-agent-based network environments.