{"title":"使用带有代理代理的移动代理确保电子交易安全","authors":"Song Han, E. Chang, T. Dillon","doi":"10.1109/ICSSSM.2005.1500113","DOIUrl":null,"url":null,"abstract":"This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that helps to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.","PeriodicalId":389467,"journal":{"name":"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Secure e-transactions using mobile agents with agent broker\",\"authors\":\"Song Han, E. Chang, T. Dillon\",\"doi\":\"10.1109/ICSSSM.2005.1500113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that helps to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.\",\"PeriodicalId\":389467,\"journal\":{\"name\":\"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSSM.2005.1500113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSSM.2005.1500113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure e-transactions using mobile agents with agent broker
This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that helps to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.