Untraceability of mobile agents

R Leszczyna, J Górski - Proceedings of the fourth international joint …, 2005 - dl.acm.org
Untraceability of mobile agents Page 1 Untraceability of Mobile Agents Rafał Leszczyna
European Commission Joint Research Centre Institute for the Protection and security of the …

Performance analysis of untraceability protocols for mobile agents using an adaptable framework

R Leszczyna, J Górski - Proceedings of the fifth international joint …, 2006 - dl.acm.org
Recently we had proposed two untraceability protocols for mobile agents and began
investigating their quality. We believe that quality evaluation of security protocols should …

Anonymity architecture for mobile agent systems

R Leszczyna - International Conference on Industrial Applications of …, 2007 - Springer
The paper presents a new security architecture for MAS, which supports anonymity of agent
owners. The architecture is composed of two main elements: Module I: Untraceability …

[PDF][PDF] An untraceability protocol for mobile agents and its enhanced security study

R Leszczyna, J Górski - 15th EICAR Annual Conference Proceedings, 2006 - Citeseer
Among various computational models to accommodate the mobile wireless computing
paradigm, the mobile agent model has major technological advantages. Moreover, our …

Securing the itinerary of mobile agents through a non-repudiation protocol

J Borrell, S Robles, J Serra… - Proceedings IEEE 33rd …, 1999 - ieeexplore.ieee.org
We propose a cryptographic solution to protect the itinerary of mobile agents. We consider
real-life applications, where hosts do not act independently but are included in a hierarchical …

Verifiable distributed oblivious transfer and mobile agent security

S Zhong, YR Yang - Proceedings of the 2003 joint workshop on …, 2003 - dl.acm.org
The mobile agent is a fundamental building block of the mobile computing paradigm. In
mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the …

[PDF][PDF] Secure migration of mobile agents based on distributed trust

ME Warnier, MA Oey, RJ Timmer… - Proceedings of the Tenth …, 2007 - research.vu.nl
Integrity of mobile agents in open environments in which no guarantees can be provided on
the integrity of the hosts on which they run, is an open challenge. This paper presents a …

[PDF][PDF] Developing a new mechanism for locating and managing mobile agents

AY Yousuf, A Hammo - J. Eng. Sci. Technol, 2012 - researchgate.net
There is a trade-off between the agent tracking process and the message delivery process in
locating mobile agent systems. In the proposed system we try to strike a balance between …

[PDF][PDF] Secure recording of itineraries through cooperating agents

V Roth - ECOOP Workshops, 1998 - Citeseer
Security is a fundamental precondition for the acceptance of mobile agent systems. In this
paper we discuss protocols to improve agent security by distributing critical data and …

Anonymity and security for autonomous mobile agents

F Raji, BT Ladani - IET information security, 2010 - IET
The mobile agent security against malicious hosts is one of the most important subjects in
mobile agent technology. An extended requirement for an agent security in different …