메뉴 건너뛰기




Volumn 12, Issue 6, 2011, Pages 981-993

A white-box encryption algorithm for computing with mobile agents

Author keywords

Encryption algorithm; Mobile agent; White Box

Indexed keywords

BLACK BOXES; BLOCK MATRIX; ENCRYPTION ALGORITHMS; FINITE FIELDS; INPUT AND OUTPUTS; SECURE DATA; WHITE-BOX;

EID: 84863298806     PISSN: 16079264     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (56)
  • 2
    • 0008921315 scopus 로고    scopus 로고
    • Electronic commerce with secure intelligent trade agent
    • Jaco van der Merwe and Sebastiaan von Solms, Electronic Commerce with Secure Intelligent Trade Agents, Proc. First International Conference on Information and Communications Security, Beijing, China, November, 1997, pp.452-462. (Pubitemid 127148074)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 452-462
    • Van Der Merwe, J.1    Von Solms, S.H.2
  • 3
    • 34548139401 scopus 로고    scopus 로고
    • The International Journal of Information Security special issue on privacy, security and trust technologies and E-business services
    • DOI 10.1007/s10207-007-0036-8
    • Scott Knight, Scott Buffett and Patrick Hung, The International Journal of Information Security Special Issue on Privacy, Security and Trust Technologies and E-Business Services, The International Journal of Information Security, Vol. 6, No. 3, 2007, pp.285-286. (Pubitemid 47299555)
    • (2007) International Journal of Information Security , vol.6 , Issue.5 , pp. 285-286
    • Knight, S.1    Buffett, S.2    Hung, P.C.K.3
  • 4
    • 32544460288 scopus 로고    scopus 로고
    • Automated silicon intellectual property trade using mobile agent technology
    • DOI 10.1016/j.rcim.2005.03.003, PII S0736584505000384
    • Amy Trappey, Charles Trappey and Felix Lin, Automated Silicon Intellectual Property Trade Using Mobile Agent Technology, Robotics and Computer-Integrated Manufacturing, Vol. 22, No. 3, 2006, pp.189-202. (Pubitemid 43233757)
    • (2006) Robotics and Computer-Integrated Manufacturing , vol.22 , Issue.3 , pp. 189-202
    • Trappey, A.J.C.1    Trappey, C.V.2    Lin, F.T.L.3
  • 5
    • 10644266748 scopus 로고    scopus 로고
    • Mobile agents for a brokering service in the electronic marketplace
    • Timon Chih-Ting Du, Eldon Li and Eric Wei, Mobile Agents for a Brokering Service in the Electronic Marketplace, Decision Support Systems, Vol. 39, No. 3, 2005, pp.371-383.
    • (2005) Decision Support Systems , vol.39 , Issue.3 , pp. 371-383
    • Du Timon, C.-T.1    Li, E.2    Wei, E.3
  • 6
    • 74549210594 scopus 로고    scopus 로고
    • A multi-agent protocol for multilateral negotiations in supply chain management
    • Tenan Wong and Fang Fang, A Multi-agent Protocol for Multilateral Negotiations in Supply Chain Management, International Journal of Production Research, Vol. 48, No. 1, 2010, pp.271-299.
    • (2010) International Journal of Production Research , vol.48 , Issue.1 , pp. 271-299
    • Wong, T.1    Fang, F.2
  • 7
    • 0034315517 scopus 로고    scopus 로고
    • Countermeasures for mobile agent security
    • DOI 10.1016/S0140-3664(00)00253-X
    • Wayne Jansen, Countermeasures for Mobile Agent Security, Computer Communications, Vol. 24, No. 13, 2000, pp.1667-1676. (Pubitemid 32033567)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1667-1676
    • Jansen, W.A.1
  • 8
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Mobile Agents and Security
    • Fritz Hohl, Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, Lecture Notes in Computer Science, Vol. 1419, 1998, pp.92-113. (Pubitemid 128104564)
    • (1998) Lecture Notes in Computer Science , Issue.1419 , pp. 92-113
    • Hohl, F.1
  • 10
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation tools for software protection
    • Christian Collberg, Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection, IEEE Transactions on Software Engineering, Vol. 28, No. 8, 2002, pp.735-746.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1
  • 13
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Mobile Agents and Security
    • Tomas Sander and Christian Tschudin, Protecting Mobile Agents Against Malicious Hosts, Lecture Notes in Computer Science, Vol. 1419, 1998, pp.44-60. (Pubitemid 128104562)
    • (1998) Lecture Notes in Computer Science , Issue.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 14
    • 70349739583 scopus 로고    scopus 로고
    • Efficient threshold proxy signature protocol for mobile agents
    • Xuan Hong, Efficient Threshold Proxy Signature Protocol for Mobile Agents, Information Sciences, Vol. 179, No. 24, 2009, pp.4243-4248.
    • (2009) Information Sciences , vol.179 , Issue.24 , pp. 4243-4248
    • Hong, X.1
  • 15
    • 54349116468 scopus 로고    scopus 로고
    • Secure multiple-times proxy signature scheme
    • Xuan Hong and Ke-Fei Chen, Secure Multiple-Times Proxy Signature Scheme, Computer Standards and Interfaces, Vol. 31, No. 1, 2009, pp.19-23.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 19-23
    • Hong, X.1    Chen, K.-F.2
  • 16
    • 78651548824 scopus 로고    scopus 로고
    • Key management and authentication in ad hoc network based on mobile agent
    • Yi Zhang, Lina Zhu and Li Feng, Key Management and Authentication in Ad Hoc Network Based on Mobile Agent, Journal of Networks, Vol. 4, No. 6, 2009, pp.487-494.
    • (2009) Journal of Networks , vol.4 , Issue.6 , pp. 487-494
    • Zhang, Y.1    Zhu, L.2    Feng, L.3
  • 17
    • 68849100401 scopus 로고    scopus 로고
    • Efficient migration access control for mobile agents
    • Yu-Fang Chung, Tzer-Shyong Chen and Ming-Wei Lai, Efficient Migration Access Control for Mobile Agents, Computer Standards and Interfaces, Vol. 31, No. 6, 2009, pp.1061-1068.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1061-1068
    • Chung, Y.-F.1    Chen, T.-S.2    Lai, M.-W.3
  • 20
    • 77956183594 scopus 로고    scopus 로고
    • A secure mobile agents platform
    • Leila Ismail, A Secure Mobile Agents Platform, Journal of Communications, Vol. 3, No. 2, 2008, pp.1-21.
    • (2008) Journal of Communications , vol.3 , Issue.2 , pp. 1-21
    • Ismail, L.1
  • 21
    • 54949120548 scopus 로고    scopus 로고
    • Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)
    • Sathish Babu and Pallapa Venkataram, Cognitive Agents Based Authentication & Privacy Scheme for Mobile Transactions (CABAPS), Computer Communications, Vol. 31, No. 17, 2008, pp.4060-4071.
    • (2008) Computer Communications , vol.31 , Issue.17 , pp. 4060-4071
    • Babu, S.1    Venkataram, P.2
  • 23
    • 39749129337 scopus 로고    scopus 로고
    • Secure and auditable agent-based e-marketplace framework for mobile users
    • DOI 10.1016/j.csi.2007.10.009, PII S0920548907000980
    • Norleyza Jailani, Noor Yatim, Mohd Faezah, Yazrina Yahya, Ahmed Patel and Mazliza Othman, Secure and Auditable Agent-Based E-Marketplace Framework for Mobile Users, Computer Standards and Interfaces, Vol. 30, No. 4, 2008, pp.237-252. (Pubitemid 351295968)
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.4 , pp. 237-252
    • Jailani, N.1    Yatim, N.F.M.2    Yahya, Y.3    Patel, A.4    Othman, M.5
  • 24
    • 34047160916 scopus 로고    scopus 로고
    • A security protocol for mobile agents based upon the cooperation of sedentary agents
    • DOI 10.1016/j.jnca.2006.04.008, PII S1084804506000427
    • Abdelhamid Ouardani, Samuel Pierre and Hanifa Boucheneb, A Security Protocol for Mobile Agents Based upon the Cooperation of Sedentary Agents, Journal of Network and Computer Applications, Vol. 30, No. 3, 2007, pp.1228-1243. (Pubitemid 46509452)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.3 , pp. 1228-1243
    • Ouardani, A.1    Pierre, S.2    Boucheneb, H.3
  • 25
    • 35348963026 scopus 로고    scopus 로고
    • TAMAP: A new trust-based approach for mobile agent protection
    • DOI 10.1007/s11416-007-0056-y
    • Salima Hacini, Zahia Guessoum and Zizette Boufaida, TAMAP: A New Trust-Based Approach for Mobile Agent Protection, Journal in Computer Virology, Vol. 3, No. 4, 2007, pp.267-283. (Pubitemid 47608139)
    • (2007) Journal in Computer Virology , vol.3 , Issue.4 , pp. 267-283
    • Hacini, S.1    Guessoum, Z.2    Boufaida, Z.3
  • 27
    • 41549112489 scopus 로고    scopus 로고
    • A robust framework for protecting computation results of mobile agents
    • Abid Khan, Xiamu Niu and Zhang Yong, A Robust Framework for Protecting Computation Results of Mobile Agents, Information Technology Journal, Vol. 7, No. 1, 2008, pp.24-31. (Pubitemid 351461945)
    • (2008) Information Technology Journal , vol.7 , Issue.1 , pp. 24-31
    • Khan, A.1    Niu, X.2    Yong, Z.3
  • 28
    • 50149089676 scopus 로고    scopus 로고
    • Using co-operating agents for partial results protection in mobile agent paradigm
    • George Helmy, Magdy Ahmed and Mohamed El-Derini, Using Co-operating Agents for Partial Results Protection in Mobile Agent Paradigm, Alexandria Engineering Journal, Vol. 46, No. 5, 2007, pp.695-702.
    • (2007) Alexandria Engineering Journal , vol.46 , Issue.5 , pp. 695-702
    • Helmy, G.1    Ahmed, M.2    El-Derini, M.3
  • 29
    • 1142282727 scopus 로고    scopus 로고
    • How, can mobile agents do secure electronic transactions on untrusted hosts? a survey of the security issues and the current solutions
    • Joris Claessens, Bart Preneel and Joos Vandewalle, (How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions, ACM Transactions on Internet Technology, Vol. 3, No. 1, 2003, pp.28-48.
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.1 , pp. 28-48
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 30
  • 31
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advances in Cryptology - CRYPTO '98
    • Ronald Cramer and Victor Shoup, A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proc. 18th Annual International Cryptology Conference, Santa Barbara, CA, August, 1998, pp.13-25. (Pubitemid 128118994)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 32
    • 84947927799 scopus 로고    scopus 로고
    • Sliding encryption: A cryptographic tool for mobile agents
    • Fast Software Encryption
    • Adam Young and Moti Yung, Sliding Encryption: A Cryptographic Tool for Mobile Agents, Proc. FSE'97, Haifa, Israel, January, 1997, pp.230-241. (Pubitemid 127100719)
    • (1997) Lecture Notes in Computer Science , Issue.1267 , pp. 230-241
    • Young, A.1    Yung, M.2
  • 33
    • 78651078800 scopus 로고    scopus 로고
    • Ph.D., Thesis, Katholieke University, Leuven, Belgium
    • Brecht Wyseur, White-Box Cryptography, Ph.D. Thesis, Katholieke University, Leuven, Belgium, 2009.
    • (2009) White-Box Cryptography
    • Wyseur, B.1
  • 37
    • 24744446230 scopus 로고    scopus 로고
    • Clarifying obfuscation: Improving the security of white-box des
    • Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
    • Hamilton Link and William Neumann, Clarifying Obfuscation: Improving the Security of White-Box DES, Proc. International Conference on Information Technology: Coding and Computing, Albuquerque, NM, April, 2005, pp.679-684. (Pubitemid 41290173)
    • (2005) International Conference on Information Technology: Coding and Computing, ITCC , vol.1 , pp. 679-684
    • Link, H.E.1    Neumann, W.D.2
  • 43
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack on block ciphers
    • Fast Software Encryption
    • Thomas Jakobsen and Lars Knudsen, The Interpolation Attack on Block Ciphers, Proc. 4th International Workshop on Fast Software Encryption, Haifa, Israel, Janurary, 1997, pp.28-40. (Pubitemid 127100701)
    • (1997) Lecture Notes in Computer Science , Issue.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 45
  • 47
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • Danny Lange and Mitsuru Oshima, Seven Good Reasons for Mobile Agents, Communications of the ACM, Vol. 42, No. 3, 1998, pp.88-89.
    • (1998) Communications of the ACM , vol.42 , Issue.3 , pp. 88-89
    • Lange, D.1    Oshima, M.2
  • 48
    • 79961038021 scopus 로고    scopus 로고
    • EBQP: Enhanced binary query protocol for RFID tag collision resolution with progressive population estimation
    • Xinqing Yan and Guiliang Zhu, EBQP: Enhanced Binary Query Protocol for RFID Tag Collision Resolution with Progressive Population Estimation, International Journal of Ad Hoc and Ubiquitous Computing, Vol. 8, No. 1/2, 2011, pp.78-84.
    • (2011) International Journal of Ad Hoc and Ubiquitous Computing , vol.8 , Issue.1-2 , pp. 78-84
    • Yan, X.1    Zhu, G.2
  • 49
    • 79953269059 scopus 로고    scopus 로고
    • Mobile business via cross layer approach toward intelligent rfid purchasing system
    • Yao-Chung Chang and Hsing-Wen Wang, Mobile Business via Cross Layer Approach toward Intelligent RFID Purchasing System, Journal of Internet Technology, Vol. 11, No. 7, 2010, pp.965-974.
    • (2010) Journal of Internet Technology , vol.11 , Issue.7 , pp. 965-974
    • Chang, Y.-C.1    Wang, H.-W.2
  • 51
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Boston, August
    • Martin Feldhofer, Sandra Dominikus and Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Proc. CHES'04, Boston, August, 2004, pp.357-370.
    • (2004) Proc. CHES'04 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 52
    • 80052479494 scopus 로고    scopus 로고
    • A novel design of data-driven architecture for remote monitoring and remote control of sensors over a wireless sensor network and the internet
    • Yuan-Jen Chang and Wen-Tzeng Huang, A Novel Design of Data-Driven Architecture for Remote Monitoring and Remote Control of Sensors over a Wireless Sensor Network and the Internet, Journal of Internet Technology, Vol. 12, No. 1, 2011, pp.129-137.
    • (2011) Journal of Internet Technology , vol.12 , Issue.1 , pp. 129-137
    • Chang, Y.-J.1    Huang, W.-T.2
  • 53
    • 77950323176 scopus 로고    scopus 로고
    • A solution for the interconnection between WSN and WiMAX Network based on gateway
    • Yu Lin and Wei Yang, A Solution for the Interconnection between WSN and WiMAX Network Based on Gateway, Journal of Internet Technology, Vol. 10, No. 4, 2009, pp.319-323.
    • (2009) Journal of Internet Technology , vol.10 , Issue.4 , pp. 319-323
    • Lin, Y.1    Yang, W.2
  • 56
    • 80053289628 scopus 로고    scopus 로고
    • Multiple mobile agents itinerary planning in wireless sensor networks: Survey and evaluation
    • Xiaofei Wang, Min Chen, Taekyoung Kwon and Han-Chieh Chao, Multiple Mobile Agents Itinerary Planning in Wireless Sensor Networks: Survey and Evaluation, IET Communications, Vol. 5, No. 12, 2011, pp.1769-1776.
    • (2011) IET Communications , vol.5 , Issue.12 , pp. 1769-1776
    • Wang, X.1    Chen, M.2    Kwon, T.3    Chao, H.-C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.