完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Tsaur, Woei-Jiunn Jr | |
dc.contributor.author | Tsai, Hsin-Chieh Jr | |
dc.date.accessioned | 2011-01-10T02:17:29Z | |
dc.date.accessioned | 2020-05-18T03:10:52Z | - |
dc.date.available | 2011-01-10T02:17:29Z | |
dc.date.available | 2020-05-18T03:10:52Z | - |
dc.date.issued | 2011-01-10T02:17:29Z | |
dc.date.submitted | 2010-12-16 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/29873 | - |
dc.description.abstract | Because the mobile agent can provide the essential properties of personalization, automation, intelligence, etc., it plays an increasingly important role in electronic business applications. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts. The proposed proxy signature scheme can protect users’ private keys stored in smart cards, and provide the fairness of contracts signed by agents. In addition, we also design a proxy authenticated encryption scheme so that the signature of the contracts will satisfy users’ constraints, and the non-repudiation of servers can be achieved. On the other hand, as far as agent host security is concerned, we apply the idea of proxy signature to construct an authentication scheme for protecting agent hosts. This scheme is to achieve the requirements of authentication and authorization. Hence, we affirm that the proposed security schemes are suitable for practical electronic business applications in mobile-agent-based network environments. | |
dc.description.sponsorship | National Cheng Kung University,Tainan | |
dc.format.extent | 6p. | |
dc.relation.ispartofseries | 2010 ICS會議 | |
dc.subject | Network security | |
dc.subject | elliptic curve cryptosystems | |
dc.subject | mobile agent | |
dc.subject | proxy signature | |
dc.subject | electronic business applications | |
dc.subject.other | Information Security | |
dc.title | Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems | |
分類: | 2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站) |
文件中的檔案:
沒有與此文件相關的檔案。
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。