{"title":"Based Mobile Agent Transaction Authentication Scheme","authors":"Zhiming Zhang, Min Yu, Minghe Huang","doi":"10.1109/CINC.2009.30","DOIUrl":null,"url":null,"abstract":"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"34 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computational Intelligence and Natural Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINC.2009.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.