完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTsaur, Woei-Jiunn Jr
dc.contributor.authorTsai, Hsin-Chieh Jr
dc.date.accessioned2011-01-10T02:17:29Z
dc.date.accessioned2020-05-18T03:10:52Z-
dc.date.available2011-01-10T02:17:29Z
dc.date.available2020-05-18T03:10:52Z-
dc.date.issued2011-01-10T02:17:29Z
dc.date.submitted2010-12-16
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/29873-
dc.description.abstractBecause the mobile agent can provide the essential properties of personalization, automation, intelligence, etc., it plays an increasingly important role in electronic business applications. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts. The proposed proxy signature scheme can protect users’ private keys stored in smart cards, and provide the fairness of contracts signed by agents. In addition, we also design a proxy authenticated encryption scheme so that the signature of the contracts will satisfy users’ constraints, and the non-repudiation of servers can be achieved. On the other hand, as far as agent host security is concerned, we apply the idea of proxy signature to construct an authentication scheme for protecting agent hosts. This scheme is to achieve the requirements of authentication and authorization. Hence, we affirm that the proposed security schemes are suitable for practical electronic business applications in mobile-agent-based network environments.
dc.description.sponsorshipNational Cheng Kung University,Tainan
dc.format.extent6p.
dc.relation.ispartofseries2010 ICS會議
dc.subjectNetwork security
dc.subjectelliptic curve cryptosystems
dc.subjectmobile agent
dc.subjectproxy signature
dc.subjectelectronic business applications
dc.subject.otherInformation Security
dc.titleSecure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems
分類:2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站)

文件中的檔案:
沒有與此文件相關的檔案。


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。