메뉴 건너뛰기




Volumn 7, Issue 5 A, 2011, Pages 2389-2404

A novel mobile agent authentication scheme for multi-host environments using self-certified pairing-based public key cryptosystem

Author keywords

Agent security; Authentication scheme; Proxy signature; Self certified public key cryptosystem

Indexed keywords

AGENT SECURITY; AUTHENTICATION AND AUTHORIZATION; AUTHENTICATION SCHEME; DISTRIBUTED SYSTEMS; MALICIOUS HOST; MOBILE AGENT TECHNOLOGY; MULTIPLE SERVICES; PERFORMANCE EVALUATION; PROXY SIGNATURE; PROXY SIGNATURE SCHEME; PUBLIC KEY CRYPTOSYSTEMS; SECURITY ISSUES; SELF-CERTIFIED; SELFCERTIFIED PUBLIC KEY;

EID: 79956061021     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (39)
  • 1
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • D. B. Lange and M. Oshima, Seven good reasons for mobile agents, Communications of the ACM, vol.42, no.3, pp.88-89, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.3 , pp. 88-89
    • Lange, D.B.1    Oshima, M.2
  • 4
    • 68849100401 scopus 로고    scopus 로고
    • Efficient migration access control for mobile agents
    • Y. F. Chung, T. S. Chen and M. W. Lai, Efficient migration access control for mobile agents, Computer Standards & Interfaces, vol.31, no.6, pp.1061-1068, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1061-1068
    • Chung, Y.F.1    Chen, T.S.2    Lai, M.W.3
  • 5
    • 58549093171 scopus 로고    scopus 로고
    • A mobile agent platform for distributed network systems management
    • D. Gavalas, G. E. Tsekouras and C. Anagnostopoulos, A mobile agent platform for distributed network systems management, J. of Systems and Software, vol.82, no.2, pp.355-371, 2009.
    • (2009) J. of Systems and Software , vol.82 , Issue.2 , pp. 355-371
    • Gavalas, D.1    Tsekouras, G.E.2    Anagnostopoulos, C.3
  • 7
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • I. C. Lin, H. H. Ou and M. S. Hwang, Efficient access control and key management schemes for mobile agents, Computer Standards & Interfaces, vol.26, no.5, pp.423-433, 2004.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 423-433
    • Lin, I.C.1    Ou, H.H.2    Hwang, M.S.3
  • 8
    • 77953892875 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a hierarchical key management scheme for access control in the mobile agent
    • Y. L. Lin and C. L. Hsu, Cryptanalysis and improvement of a hierarchical key management scheme for access control in the mobile agent, ICIC Express Letters, vol.4, no.1, pp.183-188, 2010.
    • (2010) ICIC Express Letters , vol.4 , Issue.1 , pp. 183-188
    • Lin, Y.L.1    Hsu, C.L.2
  • 9
    • 14544288238 scopus 로고    scopus 로고
    • A mobile agent protected scheme using pairing-based cryptosystems
    • W. J. Tsaur and C. H. Ho, A mobile agent protected scheme using pairing-based cryptosystems, International J. of Mobile Communications, vol.3, no.2, pp.183-196, 2005.
    • (2005) International J. of Mobile Communications , vol.3 , Issue.2 , pp. 183-196
    • Tsaur, W.J.1    Ho, C.H.2
  • 12
    • 77953894144 scopus 로고    scopus 로고
    • An improvement to Kim-Chung's authentication scheme
    • W. G. Shieh and M. T. Wang, An improvement to Kim-Chung's authentication scheme, ICIC Express Letters, vol.3, no.4(B), pp.1215-1220, 2009.
    • (2009) ICIC Express Letters , vol.3 , Issue.4 B , pp. 1215-1220
    • Shieh, W.G.1    Wang, M.T.2
  • 13
    • 64149102436 scopus 로고    scopus 로고
    • A robust authentication scheme with user anonymity for wireless environments, International Journal of Innovative Computing
    • R. C. Wang, W. S. Juang and C. L. Lei, A robust authentication scheme with user anonymity for wireless environments, International Journal of Innovative Computing, Information and Control, vol.5, no.4, pp.1069-1080, 2009.
    • (2009) Information and Control , vol.5 , Issue.4 , pp. 1069-1080
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 14
    • 63549107617 scopus 로고    scopus 로고
    • Time-bound based authentication for multi-server architecture, International Journal of Innovative Computing
    • C. C. Chang, J. S. Lee and J. Y. Kuo, Time-bound based authentication for multi-server architecture, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp.2987-2998, 2008.
    • (2008) Information and Control , vol.4 , Issue.11 , pp. 2987-2998
    • Chang, C.C.1    Lee, J.S.2    Kuo, J.Y.3
  • 15
    • 67649311831 scopus 로고    scopus 로고
    • Cross platform layer for public key infrastructure interoperability, International Journal of Innovative Computing
    • Y. F. Chung and H. F. Chen, Cross platform layer for public key infrastructure interoperability, International Journal of Innovative Computing, Information and Control, vol.5, no.6, pp.1699-1710, 2009.
    • (2009) Information and Control , vol.5 , Issue.6 , pp. 1699-1710
    • Chung, Y.F.1    Chen, H.F.2
  • 16
    • 61449086383 scopus 로고    scopus 로고
    • User authentication scheme with privacy-preservation for multi-server environment
    • R. C. Wang, W. S. Juang and C. L. Lei, User authentication scheme with privacy-preservation for multi-server environment, IEEE Communications Letters, vol.13, no.2, pp.157-159, 2009.
    • (2009) IEEE Communications Letters , vol.13 , Issue.2 , pp. 157-159
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 20
    • 25644439798 scopus 로고    scopus 로고
    • Several security schemes constructed using ECC-based self-certied public key cryp - tosystems
    • W. J. Tsaur, Several security schemes constructed using ECC-based self-certied public key cryp - tosystems, Applied Mathematics and Computation, vol.168, no.1, pp.447-464, 2005.
    • (2005) Applied Mathematics and Computation , vol.168 , Issue.1 , pp. 447-464
    • Tsaur, W.J.1
  • 24
    • 0032649638 scopus 로고    scopus 로고
    • The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • G. Frey, M. Müller and H. G. Rück, The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Trans. on Information Theory, vol.45, no.5, pp.1717-1719, 1999.
    • (1999) IEEE Trans. on Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Müller, M.2    Rück, H.G.3
  • 27
    • 33644505500 scopus 로고    scopus 로고
    • Agent based subsystem for multimedia communications
    • S. S. Manvi and P. Venkataram, Agent based subsystem for multimedia communications, IEE - Part L, Software, vol.153, no.1, pp.38-48, 2006.
    • (2006) IEE - Part L, Software , vol.153 , Issue.1 , pp. 38-48
    • Manvi, S.S.1    Venkataram, P.2
  • 28
  • 29
    • 33646865468 scopus 로고    scopus 로고
    • Building and selecting mobile agents for network management
    • I. Satoh, Building and selecting mobile agents for network management, International J. of Network and Systems Management, vol.14, no.1, pp.147-169, 2006.
    • (2006) International J. of Network and Systems Management , vol.14 , Issue.1 , pp. 147-169
    • Satoh, I.1
  • 30
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • R. Volker and J. S. Mehrdad, Access control and key management for mobile agents, Computer Graphics, vol.22, no.4, pp.457-461, 1998.
    • (1998) Computer Graphics , vol.22 , Issue.4 , pp. 457-461
    • Volker, R.1    Mehrdad, J.S.2
  • 34
    • 0012497782 scopus 로고    scopus 로고
    • Elliptic curves and cryptography
    • A. Jurisic and A. J. Menezes, Elliptic curves and cryptography, Dr. Dobb's J., pp.26-35, 1997.
    • (1997) Dr. Dobb's J , pp. 26-35
    • Jurisic, A.1    Menezes, A.J.2
  • 35
    • 77249177167 scopus 로고    scopus 로고
    • DCS: An efficient distributed certicate service scheme for vehicular networks
    • A. Wasef, Y. Jiang and X. Shen, DCS: An efficient distributed certicate service scheme for vehicular networks, IEEE Trans. on Vehicular Technology, vol.59, no.2, pp.533-549, 2010.
    • (2010) IEEE Trans. on Vehicular Technology , vol.59 , Issue.2 , pp. 533-549
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 37
    • 79956068138 scopus 로고    scopus 로고
    • Security requirements for cryptographic modules
    • Security requirements for cryptographic modules, NIST Standard FIPS, vol.140, no.2, 2004.
    • (2004) NIST Standard FIPS , vol.140 , Issue.2
  • 39
    • 77649291489 scopus 로고    scopus 로고
    • A portable integrated authentication and access control scheme for distributed embedded systems
    • Y. C. Chen and L. Y. Yeh, A portable integrated authentication and access control scheme for distributed embedded systems, International Journal of Innovative Computing, Information and Control, vol.6, no.2, pp.449-460, 2010.
    • (2010) International Journal of Innovative Computing, Information and Control , vol.6 , Issue.2 , pp. 449-460
    • Chen, Y.C.1    Yeh, L.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.