A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, t...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
The attached document may provide the author's accepted version of a published work. See Citati...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Mobile agent technology presents an attractive alternative to the client-server paradigm for several...
Securing different online e-business activities usually requires applying different cryptographic al...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
The attached document may provide the author's accepted version of a published work. See Citati...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Mobile agent technology presents an attractive alternative to the client-server paradigm for several...
Securing different online e-business activities usually requires applying different cryptographic al...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
The attached document may provide the author's accepted version of a published work. See Citati...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...