There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are condentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal\u27s anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal\u27s authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its ...
Mobile agent systems have been increasingly deployed in e-commerce in the high-end desktop client PC...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
In this thesis, security requirements for agent protection and host protection are discussed and app...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
Indiana University-Purdue University Indianapolis (IUPUI)There are many advantages of mobile agent s...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
Electronic commerce has pushed and benefited from the development of intelligent mobile agents techn...
Security techniques are very much concerned for mobile agents recently. There have been many differe...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Mobile agent systems have been increasingly deployed in e-commerce in the high-end desktop client PC...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
In this thesis, security requirements for agent protection and host protection are discussed and app...
This article introduces a new transaction protocol using mobile agents in electronic commerce. The a...
Indiana University-Purdue University Indianapolis (IUPUI)There are many advantages of mobile agent s...
Electronic commerce has pushed and benefited from the development of mobile agents technology. One o...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents trav...
Electronic commerce has pushed and benefited from the development of intelligent mobile agents techn...
Security techniques are very much concerned for mobile agents recently. There have been many differe...
Online transactions using mobile agents need secure protocols to help these mobile agents to accompl...
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent t...
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplis...
Mobile agent systems have been increasingly deployed in e-commerce in the high-end desktop client PC...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...