基于移动Agent的事务认证方案

Zhiming Zhang, Min Yu, Minghe Huang
{"title":"基于移动Agent的事务认证方案","authors":"Zhiming Zhang, Min Yu, Minghe Huang","doi":"10.1109/CINC.2009.30","DOIUrl":null,"url":null,"abstract":"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"34 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Based Mobile Agent Transaction Authentication Scheme\",\"authors\":\"Zhiming Zhang, Min Yu, Minghe Huang\",\"doi\":\"10.1109/CINC.2009.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.\",\"PeriodicalId\":173506,\"journal\":{\"name\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"volume\":\"34 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINC.2009.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computational Intelligence and Natural Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINC.2009.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着移动代理在电子商务的各种应用中越来越普遍,如何保护交易的安全性是基于移动代理的电子商务系统的关键技术。本文提出了一种移动代理安全事务认证方案,该方案利用双线性对、哈希函数和异或操作有效地保护了移动代理事务的安全性。与以往的移动代理安全方案相比,该方案提供了更高的安全性,有效地提高了计算和内存效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Based Mobile Agent Transaction Authentication Scheme
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Edge Detection Algorithm for Uneven Lighting Image Based on Vision Theory Independent Global Constraints Web Service Composition Optimization Based on Color Petri Net Summarization for Internet News Based on Clustering Algorithm Some Characterizations about 4-band Symmetric Cardinal Orthogonal Scaling Function Nutritional Diet Decision Using Multi-objective Difference Evolutionary Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1