Storing and retrieving XPath fragments in structured P2P networks
Data & Knowledge Engineering - Special issue: WIDM 2004
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Identity Based Aggregate Signcryption Schemes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
A secure mobile agent protocol for AMR systems in home network environments
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
An agent-based collaborative framework for mobile p2p applications
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Hi-index | 0.00 |
Peer-to-peer (P2P) technology can be naturallyintegrated with mobile agent technology in Internetapplications, taking advantage of the autonomy,mobility, and efficiency of mobile agents in accessingand processing data. In this paper, we address theproblem of protecting critical information in agent-based P2P Internet applications under two differentscenarios. First, we assume the route of a mobile agentin the P2P system is fixed. Under this assumption, wepropose the usage of an efficient parallel dispatch modelwhere the agent's route is signcrypted at the first stepand dispatched to each new peer to collect information.Then, we assume the route is not specified and wepropose the usage of a modified multi-signcryptionscheme to guarantee protection. Based on this secondapproach, a mobile agent determines the next peer tocommunicate with independently and information iscollected dynamically in one round of visiting a group ofpeers. Security issues under the two proposed modelsare then discussed.