The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ACM Transactions on Internet Technology (TOIT)
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Mobile agents: preserving privacy and anonymity
IMTCI'04 Proceedings of the Second international conference on Intelligent Media Technology for Communicative Intelligence
Hi-index | 0.00 |
The security problems that impact mobile agents include authentication and privacy. A challenging task is to implement secure mobile agents that provide anonymity for the mobile agent. Wang, Zhang, and Wang constructed a scheme that provides secure web transactions with anonymous mobile agents over the internet. Our paper will discuss the Wang, Zhang and Wang protocol(WZW) thoroughly, our work demonstrates the weaknesses of the WZW protocol, showing that it is not as secure as it is claimed to be. In this paper, we will construct attacks on the WZW protocol, provide several repairs and construct a secure scheme for conducting E-commerce using anonymous mobile agents.