Show simple item record

dc.contributor.authorHan, Song
dc.contributor.authorChang, Elizabeth
dc.contributor.authorDillon, Tharam S.
dc.date.accessioned2017-01-30T12:55:49Z
dc.date.available2017-01-30T12:55:49Z
dc.date.created2008-11-12T23:25:00Z
dc.date.issued2005
dc.identifier.citationHan, Song and Chang, Elizabeth and Dillon, Tharam. 2005. : Secure e-transactions using mobile agents with agent broker, Services Systems and Services Management, 2005 Proceedings of ICSSSM '05. 2005 International Conference on, 13-15 Jun 2005, pp. 849-855. China: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/26884
dc.identifier.doi10.1109/ICSSSM.2005.1500113
dc.description.abstract

This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that will help to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol.

dc.publisherIEEE
dc.subjecte-Transaction
dc.subjecttrust
dc.subjectecommerce
dc.subjectprivacy
dc.subjectsecurity
dc.subjectSecurity
dc.subjectPrivacy
dc.subjectMobile Agent
dc.subjectinformation systems
dc.subjectShort Signature
dc.titleSecure e-transactions using mobile agents with agent broker
dc.typeConference Paper
dcterms.source.startPage849
dcterms.source.endPage855
dcterms.source.conferenceServices Systems and Services Management, 2005 Proceedings of ICSSSM '05. 2005 International Conference on
dcterms.source.conference-start-date13-15 Jun 2005
dcterms.source.conferencelocationChina
curtin.note

Copyright 2005 IEEE

curtin.note

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-756
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record