English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4200220      Online Users : 1028
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/21629


    Title: Access control and key management scheme based on bilinear pairings over elliptic curves for mobile agent
    Authors: Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.
    Contributors: Department of Electrical Engineering, Tunghai University
    Keywords: Access control;Bilinear pairings;Information security;Key management;Mobile agent
    Date: 2009-06-04
    Issue Date: 2013-05-15T09:03:23Z (UTC)
    Publisher: Qingdao; China
    Abstract: The related techniques and applications of e-commerce have always been the outmost concerned issue for researchers. Particularly, the use of mobile agent is an important technique on the applications of e-commerce. Mobile agent, for its high autonomy and mobility, can move freely in different execution environments, can automatically detect the resided environment, and react accordingly. Finally, the mobile agent can complete the tasks which are assigned by the users. These characteristics help shaping the mobile agent becomes the most suitable for e-commerce applications. It is always risky to transfer confidential information over an open Internet environment. When the mobile agent roams among the hosts over the internet or exchanges information with others, the users would have concerns whether the mobile agent could be attacked by manipulated hosts or the confidential information that are carried could be stolen and tampered by the others. All these worries make the safety of the mobile agent on the Internet an important issue. This paper proposes a suitable security scheme for the mobile agent. The scheme is consist of a hierarchy structured key management and an access control scheme based on bilinear pairing over elliptic curves. The paper aims to add improvements on the key management and the access control scheme of Volker and Mehrdad and resolves the issue of storage waste by storing the overlapping secret keys of the mobile agent. Based upon the results of the security and performance analysis on this paper, the proposed scheme is proven to protect the mobile agent in an efficient and secure way. ? 2009 IEEE.
    Relation: 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009
    2009, Article number5319018, Pages 189-196
    Appears in Collections:[電機工程學系所] 會議論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML471View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback