A course in computational algebraic number theory
A course in computational algebraic number theory
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Security Issues in Mobile Agent Technology
FTDCS '99 Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems
A Security Architecture for Mobile Agents in Ajanta
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Wireless Communications & Mobile Computing
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reducing inference control to access control for normalized database schemas
Information Processing Letters
Probabilistic algorithms in finite fields
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
High speed modular divider based on GCD algorithm
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
A new untraceable off-line electronic cash system
Electronic Commerce Research and Applications
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce
Expert Systems with Applications: An International Journal
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
A secure mobile electronic payment architecture platform for wireless mobile networks
IEEE Transactions on Wireless Communications
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Journal of Medical Systems
Low-power and high-speed design of a versatile bit-serial multiplier in finite fields GF(2m)
Integration, the VLSI Journal
Hi-index | 0.00 |
Huang et al. has recently proposed an efficient key management and access control scheme for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their scheme provides superior efficiency in comparison with the previous works, however some active attacks threaten its security. In this paper a new dynamic key management scheme based on ECC is proposed that is secure and also is efficient in computation cost. Analyzing the security criteria and performance confirms suitability of the proposed scheme for mobile agent environments.