Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure Data Collection with Updates
Electronic Commerce Research - Special issue on agents in electronic commerce
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Trusted Mediation for E-service Provision in Electronic Marketplaces
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
An efficient electronic payment system withstanding parallel attacks
An efficient electronic payment system withstanding parallel attacks
Payment technologies for E-commerce
Hi-index | 0.00 |
Protection of data integrity in mobile agents has drawn much attention in recent years. Various degrees of agent data integrity have been achieved by a number of proposed schemes. A known vulnerability of these published techniques is the truncation attack. In this paper we propose a “fair forfeit” technique to prevent the truncation attack. It also prevents other known attacks such as the modification, insertion and deletion attacks.