{"title":"Secure e-transactions using mobile agents with agent broker","authors":"Song Han, E. Chang, T. Dillon","doi":"10.1109/ICSSSM.2005.1500113","DOIUrl":null,"url":null,"abstract":"This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that helps to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.","PeriodicalId":389467,"journal":{"name":"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSSM.2005.1500113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that helps to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.