By Topic

Secure electronic business applications in mobile agent based networks using elliptic curve cryptosystems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tsaur, W. ; Dept. of Inf. Manage., Da-Yeh Univ., Changhua, Taiwan ; Hsin-Chieh Tsai

Because the mobile agent can provide the essential properties of personalization, automation, intelligence, etc., it plays an increasingly important role in electronic business applications. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts. The proposed proxy signature scheme can protect users' private keys stored in smart cards, and provide the fairness of contracts signed by agents. In addition, we also design a proxy authenticated encryption scheme so that the signature of the contracts will satisfy users' constraints, and the non-repudiation of servers can be achieved. On the other hand, as far as agent host security is concerned, we apply the idea of proxy signature to construct an authentication scheme for protecting agent hosts. This scheme is to achieve the requirements of authentication and authorization. Hence, we affirm that the proposed security schemes are suitable for practical electronic business applications in mobile-agent-based network environments.

Published in:

Computer Symposium (ICS), 2010 International

Date of Conference:

16-18 Dec. 2010