Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should extend a sole validation of their security and cover other quality aspects, primarily their efficiency. Thus after conducting a security analysis, we wanted to complement it with a performance analysis. For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can be applied to evaluate performance of a whole class of security protocols for mobile agents. This class contains the protocols in which each host on the agent's route is responsible for providing a security function, and, inter alia, includes a big vari...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
ABSTRACT: The main challenge when deploying mobile agent environments pertains to security issues co...
Recently we had proposed two untraceability protocols for mobile agents and began investigating thei...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
Context: Mobile agents are considered quite challenging and provide scope for developing innovative ...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract: Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for...
Abstract: In the paper we are concerned with resistance to the traffic analysis for mobile agents. T...
Mobile agent security is still a young discipline and most naturally, the focus up to the time of wr...
Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protectin...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
ABSTRACT: The main challenge when deploying mobile agent environments pertains to security issues co...
Recently we had proposed two untraceability protocols for mobile agents and began investigating thei...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
Context: Mobile agents are considered quite challenging and provide scope for developing innovative ...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract: Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for...
Abstract: In the paper we are concerned with resistance to the traffic analysis for mobile agents. T...
Mobile agent security is still a young discipline and most naturally, the focus up to the time of wr...
Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protectin...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
ABSTRACT: The main challenge when deploying mobile agent environments pertains to security issues co...