{"title":"基于移动Agent的事务认证方案","authors":"Zhiming Zhang, Min Yu, Minghe Huang","doi":"10.1109/CINC.2009.30","DOIUrl":null,"url":null,"abstract":"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"34 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Based Mobile Agent Transaction Authentication Scheme\",\"authors\":\"Zhiming Zhang, Min Yu, Minghe Huang\",\"doi\":\"10.1109/CINC.2009.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.\",\"PeriodicalId\":173506,\"journal\":{\"name\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"volume\":\"34 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINC.2009.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computational Intelligence and Natural Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINC.2009.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Based Mobile Agent Transaction Authentication Scheme
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.