|
English
|
正體中文
|
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4200220
Online Users : 1028
|
|
|
Loading...
|
Please use this identifier to cite or link to this item:
http://140.128.103.80:8080/handle/310901/21629
|
Title: | Access control and key management scheme based on bilinear pairings over elliptic curves for mobile agent |
Authors: | Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D. |
Contributors: | Department of Electrical Engineering, Tunghai University |
Keywords: | Access control;Bilinear pairings;Information security;Key management;Mobile agent |
Date: | 2009-06-04 |
Issue Date: | 2013-05-15T09:03:23Z (UTC)
|
Publisher: | Qingdao; China |
Abstract: | The related techniques and applications of e-commerce have always been the outmost concerned issue for researchers. Particularly, the use of mobile agent is an important technique on the applications of e-commerce. Mobile agent, for its high autonomy and mobility, can move freely in different execution environments, can automatically detect the resided environment, and react accordingly. Finally, the mobile agent can complete the tasks which are assigned by the users. These characteristics help shaping the mobile agent becomes the most suitable for e-commerce applications. It is always risky to transfer confidential information over an open Internet environment. When the mobile agent roams among the hosts over the internet or exchanges information with others, the users would have concerns whether the mobile agent could be attacked by manipulated hosts or the confidential information that are carried could be stolen and tampered by the others. All these worries make the safety of the mobile agent on the Internet an important issue. This paper proposes a suitable security scheme for the mobile agent. The scheme is consist of a hierarchy structured key management and an access control scheme based on bilinear pairing over elliptic curves. The paper aims to add improvements on the key management and the access control scheme of Volker and Mehrdad and resolves the issue of storage waste by storing the overlapping secret keys of the mobile agent. Based upon the results of the security and performance analysis on this paper, the proposed scheme is proven to protect the mobile agent in an efficient and secure way. ? 2009 IEEE. |
Relation: | 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009 2009, Article number5319018, Pages 189-196 |
Appears in Collections: | [電機工程學系所] 會議論文
|
Files in This Item:
File |
Size | Format | |
index.html | 0Kb | HTML | 471 | View/Open |
|
All items in THUIR are protected by copyright, with all rights reserved.
|