메뉴 건너뛰기




Volumn 31, Issue 17, 2008, Pages 4060-4071

Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)

Author keywords

Authentication; Cognitive agents; Mobile security; Mobile transactions; Privacy

Indexed keywords

ACCESS CONTROL; AGENTS; AUTHENTICATION;

EID: 54949120548     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.08.011     Document Type: Article
Times cited : (8)

References (18)
  • 3
    • 54949121812 scopus 로고    scopus 로고
    • N.G. Aghaee, T.I. Oren, Effects of cognitive complexity in agent simulation: basics, in: Proceedings of the Summer Computer Simulation Conference, 2004, pp. 15-19.
    • N.G. Aghaee, T.I. Oren, Effects of cognitive complexity in agent simulation: basics, in: Proceedings of the Summer Computer Simulation Conference, 2004, pp. 15-19.
  • 4
    • 54949151151 scopus 로고    scopus 로고
    • A.S. Rao, M. Georgeff, BDI agents: from theory to practice, in: Proceedings of the First International Conference on Multi-Agent Systems, 1995, pp. 312-319.
    • A.S. Rao, M. Georgeff, BDI agents: from theory to practice, in: Proceedings of the First International Conference on Multi-Agent Systems, 1995, pp. 312-319.
  • 5
    • 54949107853 scopus 로고    scopus 로고
    • T. Shimoda, A Theory Belief Model for Cognitive Agents, Colorado State University.
    • T. Shimoda, A Theory Belief Model for Cognitive Agents, Colorado State University.
  • 6
    • 0029232793 scopus 로고    scopus 로고
    • D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, 1994, pp. 196-199.
    • D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, 1994, pp. 196-199.
  • 7
    • 4544376760 scopus 로고    scopus 로고
    • A. Qayedi, W. Adi, A. Zahro, A. Mabrouk, Combined web/mobile authentication for secure web access control, in: Wireless Communications and Networking Conference, vol. 2, 2004, pp. 677-681.
    • A. Qayedi, W. Adi, A. Zahro, A. Mabrouk, Combined web/mobile authentication for secure web access control, in: Wireless Communications and Networking Conference, vol. 2, 2004, pp. 677-681.
  • 8
    • 54949121811 scopus 로고    scopus 로고
    • K. Sha, Y. Xi, W. Shi, L. Schwiebert, T. Zhang, Adaptive privacy-preserving authentication in vehicular networks, in: First International Conference on Communications and Networking in China, 2006, pp. 1-8.
    • K. Sha, Y. Xi, W. Shi, L. Schwiebert, T. Zhang, Adaptive privacy-preserving authentication in vehicular networks, in: First International Conference on Communications and Networking in China, 2006, pp. 1-8.
  • 9
    • 26444533983 scopus 로고    scopus 로고
    • H. Chen, T.V.L.N. Sivakumar, New authentication method for mobile centric communications, in: The IEEE 61st Conference on Vehicular Technology, 2005, pp. 2780-2784.
    • H. Chen, T.V.L.N. Sivakumar, New authentication method for mobile centric communications, in: The IEEE 61st Conference on Vehicular Technology, 2005, pp. 2780-2784.
  • 10
    • 27544491391 scopus 로고    scopus 로고
    • D.P. Benjamin, R.S. Iyer, A. Perumal, VMSoar: a cognitive agent for network security, in: Proceedings of SPIE, vol. 5812, 2005, pp. 72-80.
    • D.P. Benjamin, R.S. Iyer, A. Perumal, VMSoar: a cognitive agent for network security, in: Proceedings of SPIE, vol. 5812, 2005, pp. 72-80.
  • 12
    • 54949142218 scopus 로고    scopus 로고
    • C.M. Jonker, J. Treur, W. de Vries, Temporal analysis of the dynamics of beliefs, desires, and intentions, in: Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions, and Values: Computational Architectures), vol. 2, 2002, pp. 471-494.
    • C.M. Jonker, J. Treur, W. de Vries, Temporal analysis of the dynamics of beliefs, desires, and intentions, in: Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions, and Values: Computational Architectures), vol. 2, 2002, pp. 471-494.
  • 13
    • 54949103616 scopus 로고    scopus 로고
    • S.S. Chan, X. Fang, K. Brzezinski, Y. Zhow, S. Xu, J. Lam, Usability for mobile commerce across multiple form factors, Journal of Electronic Commerce Research 3 (2002) 187-199.
    • S.S. Chan, X. Fang, K. Brzezinski, Y. Zhow, S. Xu, J. Lam, Usability for mobile commerce across multiple form factors, Journal of Electronic Commerce Research 3 (2002) 187-199.
  • 14
    • 13844302727 scopus 로고    scopus 로고
    • P.S. Alvirado, C.L. Roncancio, M. Adiba, Analyzing mobile transactions support for DBMS, in: The 12th International Workshop on Database and Expert Systems Applications, 2001, pp. 595-600.
    • P.S. Alvirado, C.L. Roncancio, M. Adiba, Analyzing mobile transactions support for DBMS, in: The 12th International Workshop on Database and Expert Systems Applications, 2001, pp. 595-600.
  • 15
    • 0031651439 scopus 로고    scopus 로고
    • E. Bertino, S. Jajodia, L. Mancini, I. Ray, Advanced transaction processing in multilevel secure file stores, in: IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, 1998, pp. 120-135.
    • E. Bertino, S. Jajodia, L. Mancini, I. Ray, Advanced transaction processing in multilevel secure file stores, in: IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, 1998, pp. 120-135.
  • 16
    • 74849130457 scopus 로고    scopus 로고
    • D. Rosenthal, F. Fung, A test for non-disclosure in security level translations, in: IEEE Symposium on Security and Privacy, 1999, pp. 196-206.
    • D. Rosenthal, F. Fung, A test for non-disclosure in security level translations, in: IEEE Symposium on Security and Privacy, 1999, pp. 196-206.
  • 17
    • 85118286626 scopus 로고    scopus 로고
    • S. Sutikno, A. Surya, An architecture of F(22N) multiplier for elliptic curves cryptosystem, in: Proceedings of ISCAS 2000 on Circuits and Systems, vol. 1, 2000, pp. I-279-I-282.
    • S. Sutikno, A. Surya, An architecture of F(22N) multiplier for elliptic curves cryptosystem, in: Proceedings of ISCAS 2000 on Circuits and Systems, vol. 1, 2000, pp. I-279-I-282.
  • 18
    • 54949084289 scopus 로고    scopus 로고
    • http://sourceforge.net/projects/agentfactory.
    • http://sourceforge.net/projects/agentfactory.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.