Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Mobile agents integrity for electronic commerce applications
Information Systems - Special issue on information systems support for electronic commerce
Secure communications over insecure channels
Communications of the ACM
Fundamentals of Computer Security
Fundamentals of Computer Security
One-Round Secure Computation and Secure Autonomous Mobile Agents
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Authentication for Mobile Agents
Mobile Agents and Security
An attack and repair of secure web transaction protocol for anonymous mobile agents
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hi-index | 0.00 |
The mobile agent systems have been well known for years, but recent developments in the mobile technology (mobile phones, middleware) and the artificial intelligence created new research directions. Currently being widely used for the e-commerce and network management are entering into more personal areas of our life, e.g., booking airline tickets, doing shopping, making an appointment at the dentist. Future agents are becoming more like our representatives in the Internet than simple software. To operate efficiently in their new role they need to have the same capabilities as we do, showing their credentials when required and being anonymous when needed. Still they have to fulfill all security requirements for agent systems, including confidentiality, integrity, accountability, and availability. This paper focuses on providing mobile agents with anonymity and privacy. The proposed schemes are based on different cryptographic primitives: the secret sharing scheme and the zero-knowledge proof. The paper also includes a discussion of security of the proposed schemes.