Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile environment. For example, a server may compromise the mobile agent and try to obtain private information of the client. A solution to tackle this issue has been proposed. However, the existing solution is implemented using RSA signatures that result in long signatures and heavy workloads for the mobile agent. Mobile agents will migrate from the client to a server and from one server to other servers in order to accomplish the client?s transaction plan. Therefore, it will be interesting to re-tackle this issue. We present a new...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
The attached document may provide the author's accepted version of a published work. See Citati...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
Security techniques are very much concerned for mobile agents recently. There have been many differe...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
The attached document may provide the author's accepted version of a published work. See Citati...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
Security techniques are very much concerned for mobile agents recently. There have been many differe...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
In this thesis, security requirements for agent protection and host protection are discussed and app...