Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Apoptosis — the programmed death of distributed services
Secure Internet programming
Mutual protection of co-operating agents
Secure Internet programming
Target Naming and Service Apoptosis
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Secure Communication for Secure Agent-Based Electronic Commerce Applications
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Role-Based Access Control for E-commerce Sea-of-Data Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
Security: important issue in e-commerce
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Advanced mobile agent security models for code integrity and malicious availability check
Journal of Network and Computer Applications
A survey of security issue in multi-agent systems
Artificial Intelligence Review
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Security Issues in Mobile Agent Applications
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |
In this paper, we introduce a collection of cryptographic key constructions built from environmental data that are resistant to adversarial analysis and deceit. We expound upon their properties and discuss some possible applications; the primary envisioned use of these constructions is in the creation of mobile agents whose analysis does not reveal their exact purpose.