A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Investigation of non-repudiation protocols
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
How to Play Sherlock Holmes in the World of Mobile Agents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Method for Protecting Mobile Agents against Denial of Service Attacks
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
. In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect profile information of the agent's owner. Furthermore, it is shown that the protected route resists attacks from a single malicious host and from colluding malicious hosts as well.