期刊文献+

一种移动代理密钥管理方案

A KEY MANAGEMENT SCHEME FOR MOBILE AGENT
下载PDF
导出
摘要 随着Internet的飞速发展,与电子商务相关的应用已成为学者研究的热点,其中Mobile Agent在电子商务中的应用近年来更是引起广泛的关注,如何保护Mobile Agent的安全是基于Agent电子商务系统的关键。使用哈希函数提出一种移动代理密钥管理方案,与目前现有的移动代理密钥管理方案相比,不仅安全性好,而且还具有较低的空间复杂度和计算复杂度,更适合于移动代理。 With the rapid development of the Internet,applications correlated to Electronic Commerce have become the hotspot of research for scholars,among them the application of Mobile Agent in Electronic Commerce has attracted even more wide attention in recent years,and how to protect the security of Mobile Agent is the key technology in Agent based Electronic Commerce system.In this paper,a hash functionbased key management scheme for Mobile Agent is proposed.Comparing with current similar schemes,the efficiency of this scheme is improved distinctly with lower computation and space complexity,and it is more suitable for the mobile agent.
出处 《计算机应用与软件》 CSCD 2010年第4期90-92,共3页 Computer Applications and Software
基金 国家科技型中小企业技术创新基金项目(07C26213600564) 国家重点基础研究发展计划项目(2007CB316505 2006CB303000)
关键词 移动代理 密钥 密钥管理 Mobile agent Key Key management
  • 相关文献

参考文献1

二级参考文献8

  • 1Esparza O, Sorlano M, Mufioz J E, et al. A Protocol for Detecting Malicious Hosts Based on Eimiting the Execution Time of Mobile Agents[C]. Eighth IEEE International Symposium on Computers and Communications, 2003.
  • 2Abdelmorhit E R, Samuel P, Hanifa B. Secure Protocol in Mobile Agent Environment[C]. Canadian Conference on Electrical and Computer Engineering, 2003-05.
  • 3Sander T, Tschudin C F. Protecting Mobile Agents Against Malicious Hosts[M]. Mobile Agents and Security, LNCS, Springer-Verlag, 1998, 1419.
  • 4Hohl F. A Framework to Protect Mobile Agents by Using Reference States[C]. Proceedings 20^th International Conference on Distributed Computing Systems, IEEE Computer Society, California,2000:410-417.
  • 5Kamik N M, Tripathi A R. A Security Architecture for Mobile Agents in Ajanta[C]. Proceedings 20^th International Conference on Distributed Computing Systems, IEEE Computer Society, California, 2000:402-409.
  • 6Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts[M]. Mobile Agents and Security, LNCS,Springer-Verlag, 1998, 1419.
  • 7Mir J, Borrell J. Protecting General Flexible Itineraries of Mobile Agents[M]. Information Security and Cryptology, LNCS, Springer-Verlag, 2001, 2288.
  • 8Vigna G. Cryptographic Traces for Mobile Agents[M]. Mobile Agents and Security, LNCS, Springer-Verlag, 1998, 1419.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部