Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Authentication for Mobile Agents
Mobile Agents and Security
Scalable Home Network Interaction Model Based on Mobile Agents
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Security in mobile agent systems
Security in mobile agent systems
Home networks: a standards perspective
IEEE Communications Magazine
Hi-index | 0.00 |
Recently, interests on the home network, that requires new services and new computing paradigms, have enormously been increased. Applying the mobile agent to the home network is expected to provide a new computing model. The mobile agent authentication is a preceding technology to apply the mobile agent concept to the home network environments. The existing public key based authentication scheme is not suitable to the home network devices which has the limited computation capability. In this paper, we propose a lightweight mobile agent authentication scheme based on the shared key and public key infrastructures.