[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs which attack or steal our server or original data. Hence, this paper proposes a mobile agent application of E-commerce system and some authentication mechanisms for the system that include authentication of the legality of servers in E-commerce, authentication of the legality of mobile agents, and the verification of attacks on servers and mobile agents. By applying mobile agent and encryption/ decryption technologies, this paper will introduce how coordinator server establ...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...