Mutual protection of co-operating agents
Secure Internet programming
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Mobile Agents Protection in the Internet Environment
COMPSAC '99 23rd International Computer Software and Applications Conference
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Making Agents Secure on the Semantic Web
IEEE Internet Computing
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Mobile Information Systems
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
Agent mobility architecture based on IEEE-FIPA standards
Computer Communications
Promoting the development of secure mobile agent applications
Journal of Systems and Software
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents
Computer Communications
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straightforward way. Our aim is to demonstrate how cryptographic processing can be implemented transparently for agent programmers, thereby reducing the risks of human error in (secure) mobile agent programming.