Handbook of Applied Cryptography
Handbook of Applied Cryptography
Mobile Agents Protection in the Internet Environment
COMPSAC '99 23rd International Computer Software and Applications Conference
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
FIPA-Based Interoperable Agent Mobility
CEEMAS '07 Proceedings of the 5th international Central and Eastern European conference on Multi-Agent Systems and Applications V
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects of mobile agents. However, past experience shows that protocols can be flawed, and flaws in protocols can remain unnoticed for a long period of time. The game of breaking and fixing protocols is a necessary evolutionary process that leads to a better understanding of the underlying problems and ultimately to more robust and secure systems. Although, to the best of our knowledge, little work has been published on breaking protocols for mobile agents, it is inconceivable that the multitude of protocols proposed so far are all flawless. As it turns out, the opposite is true. We identify flaws in protocols proposed by Corradi et al., Karjoth et al., and Karnik et al., including protocols based on secure co-processors.