A Forgery detection protocol for protection of mobile agent execution results


The KIPS Transactions:PartB , Vol. 9, No. 5, pp. 517-522, Oct. 2002
10.3745/KIPSTB.2002.9.5.517,   PDF Download:

Abstract

Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. Y. Kim, J. H. Shin, W. Shin, K. H. Rhee, "A Forgery detection protocol for protection of mobile agent execution results," The KIPS Transactions:PartB , vol. 9, no. 5, pp. 517-522, 2002. DOI: 10.3745/KIPSTB.2002.9.5.517.

[ACM Style]
Hee Yeon Kim, Jung Hwa Shin, Weon Shin, and Kyung Hyune Rhee. 2002. A Forgery detection protocol for protection of mobile agent execution results. The KIPS Transactions:PartB , 9, 5, (2002), 517-522. DOI: 10.3745/KIPSTB.2002.9.5.517.