This paper presents a novel method that allows an agent host to delegate its signing power to an anonymous mobile agent in such away that the mobile agent does not reveal any information about its host-s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The solution introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the solution ...
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional...
In [7] we have proposed a model for the robust and private evaluation of a function within a group o...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
This paper presents a Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) pr...
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent s...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
A 'pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were intro...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional...
In [7] we have proposed a model for the robust and private evaluation of a function within a group o...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
This paper presents a Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) pr...
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent s...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
A 'pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were intro...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional...
In [7] we have proposed a model for the robust and private evaluation of a function within a group o...
Abstract:- This paper proposes two appropriate security schemes for protecting consumer electronic a...