Indiana University-Purdue University Indianapolis (IUPUI)There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptograp...
Software agents, as the main body of agent-oriented E-commerce systems, have a great potential for E...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This thesis investigates security in multi-agent systems for mobile communication. Mobile as well as...
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses...
Mobile agent systems have a multitude of applications in areas such as network management systems, t...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Mobile agents are active objects that can autonomously migrate in a network to perform tasks on beha...
Mobile agent is gaining attention in the research community because of its potential to replace trad...
Software agents, as the main body of agent-oriented E-commerce systems, have a great potential for E...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adap...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This thesis investigates security in multi-agent systems for mobile communication. Mobile as well as...
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses...
Mobile agent systems have a multitude of applications in areas such as network management systems, t...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Mobile agents are active objects that can autonomously migrate in a network to perform tasks on beha...
Mobile agent is gaining attention in the research community because of its potential to replace trad...
Software agents, as the main body of agent-oriented E-commerce systems, have a great potential for E...
In this thesis, security requirements for agent protection and host protection are discussed and app...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...