Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Communications of the ACM
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
A note on Girault's self-certified model
Information Processing Letters
Expert Systems with Applications: An International Journal
An evidential cooperative multi-agent system
Expert Systems with Applications: An International Journal
Multi-agent based distributed inventory control model
Expert Systems with Applications: An International Journal
A channel recommendation system in mobile environment
IEEE Transactions on Consumer Electronics
Using management markup language for remote control of OSGi-based home server
IEEE Transactions on Consumer Electronics
Agent-based user mobility support mechanism in RFID networking environment
IEEE Transactions on Consumer Electronics
Expert Systems with Applications: An International Journal
Hi-index | 12.05 |
The mobile agent plays an increasingly important role in electronic business applications, because it can provide the essential properties of personalization, automation and intelligence, etc. This paper proposes several appropriate security schemes for protecting mobile agent networks in electronic business applications. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts. The proposed proxy signature scheme can protect users' private keys stored in smart cards, and provide the fairness of contracts signed by agents. In addition, we also design a proxy authenticated encryption scheme so that the signature of the contracts will satisfy users' constraints, and the non-repudiation of servers can be achieved. On the other hand, as far as agent host security is concerned, we apply the idea of proxy signature to construct an authentication scheme for protecting agent hosts. This scheme is to achieve the requirements of authentication and authorization. Furthermore, we also implement the proposed security schemes to achieve security requirements of confidentiality, integrity, authenticity, and non-repudiation for protecting Linux-based mobile agents and hosts in an electronic auction application. Hence, we affirm that the proposed security schemes are suitable for practical electronic business applications in mobile-agent-based network environments.