메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 659-664

Protection of mobile agent data collection by using ring signature

Author keywords

Forward privacy; Mobile agent; Pricing query; Publicly verifiable forward integrity; Ring signature

Indexed keywords

COMPUTER HARDWARE; CRYPTOGRAPHY; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 2942648244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (19)
  • 1
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Lecture Notes in Computer Science, Springer Verlag
    • Mihir Bellare and Phillip Rogaway, "Optimal asymmetric encryption," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol.950, Springer Verlag, pp.92-111, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • Lecture Notes in Computer Science, Springer Verlag
    • Emmanuel Bresson, Jacques Stern, and Michael Szydlo, "Threshold ring signatures and applications to ad-hoc groups," Advances in Cryptalogy -CRYPTO 2002, Lecture Notes in Computer Science, Vol.2442, Springer Verlag, pp.465-480, 2002.
    • (2002) Advances in Cryptalogy -CRYPTO 2002 , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 4
    • 84957354154 scopus 로고    scopus 로고
    • Efficient and generalized group signatures
    • Lecture Notes in Computer Science, Springer Verlag
    • Jan Camenisch, "Efficient and generalized group signatures," Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, Vol.1233, Springer Verlag, pp.465-479, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT '97 , vol.1233 , pp. 465-479
    • Camenisch, J.1
  • 5
    • 85024290278 scopus 로고
    • Group signature
    • Lecture Notes in Computer Science, Springer Verlag
    • David Chaum and Eugéne Van Heyst, "Group signature," Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, Vol.547, Springer Verlag, pp.257-265, 1991.
    • (1991) Advances in Cryptology - EUROCRYPT '91 , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 6
    • 84944079908 scopus 로고    scopus 로고
    • Defenses against the truncation of computation results of free-roaming agents
    • Lecture Notes in Computer Science, Springer Verlag
    • Jeff S.L. Cheng and Victor K. Wei, "Defenses against the truncation of computation results of free-roaming agents," Information and Communication Security: 4th International Conference, ICICS 2002, Lecture Notes in Computer Science, Vol.2513, Springer Verlag, pp.1-12, 2002.
    • (2002) Information and Communication Security: 4th International Conference, ICICS 2002 , vol.2513 , pp. 1-12
    • Cheng, J.S.L.1    Wei, V.K.2
  • 7
    • 84927752554 scopus 로고    scopus 로고
    • Design verifier proofs and their applications
    • Lecture Notes in Computer Science, Springer Verlag
    • Markus Jakobsson, Kazue Sake, and Russel Impagliazzo, "Design verifier proofs and their applications," Advances in Cryptology - EUROCRYPT '96, Lecture Notes in Computer Science, Vol.1070, Springer Verlag, pp.143-154, 1996.
    • (1996) Advances in Cryptology - EUROCRYPT '96 , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sake, K.2    Impagliazzo, R.3
  • 9
    • 84944880876 scopus 로고    scopus 로고
    • Secure mobile agent-based merchant brokering in distributed marketplaces
    • Lecture Notes in Computer Science, Springer Verlag
    • Günter Karjoth, "Secure mobile agent-based merchant brokering in distributed marketplaces," Joint Symposium on Agent Systems and Applications / Mobile Agents, ASA/MA 2000, Lecture Notes in Computer Science, Vol.1882, Springer Verlag, pp.44-56, 2000.
    • (2000) Joint Symposium on Agent Systems and Applications / Mobile Agents, ASA/MA 2000 , vol.1882 , pp. 44-56
    • Karjoth, G.1
  • 10
    • 84867313902 scopus 로고    scopus 로고
    • Protecting the computation results of free-roaming agents
    • Lecture Notes in Computer Science, Springer Verlag
    • Günter Karjoth, N. Asokan, and Ceki Gülcü, "Protecting the computation results of free-roaming agents," Mobile Agents: Second International Workshop, MA '98, Lecture Notes in Computer Science, Vol. 1477, Springer Verlag, pp.195-207, 1998.
    • (1998) Mobile Agents: Second International Workshop, MA '98 , vol.1477 , pp. 195-207
    • Karjoth, G.1    Asokan, N.2    Gülcü, C.3
  • 11
    • 0035836592 scopus 로고    scopus 로고
    • Security in the Ajanta mobile agent system
    • John Wiley & Sons
    • Neeran Karnik and Anand Tripathi, "Security in the Ajanta mobile agent system," Software - Practice and Experience, Vol.31, No.4, John Wiley & Sons, 2001.
    • (2001) Software - Practice and Experience , vol.31 , Issue.4
    • Karnik, N.1    Tripathi, A.2
  • 15
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Lecture Notes in Computer Science, Springer Verlag
    • Ronald L. Rivest, Adi. Shamir, and Yael. Tauman "How to leak a secret," Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, Vol.2248, Springer Verlag, pp.552-565, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 16
    • 84948143184 scopus 로고    scopus 로고
    • On the robustness of some cryptographic protocols for mobile agent protection
    • Lecture Notes in Computer Science, Springer Verlag
    • Volker Roth, "On the robustness of some cryptographic protocols for mobile agent protection," Mobile Agents: 5th International Conference, MA 2001, Lecture Notes in Computer Science, Vol.2240, Springer Verlag, pp.1-14, 2001.
    • (2001) Mobile Agents: 5th International Conference, MA 2001 , vol.2240 , pp. 1-14
    • Roth, V.1
  • 19
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • Bennet S. Yee, "A sanctuary for mobile agents," Secure Internet Programming, pp.261-273, 1999.
    • (1999) Secure Internet Programming , pp. 261-273
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.