Secure e-transactions protocol preserving privacy for customers and bidders
MetadataShow full item record
The original publication is available at http://www.springerlink.com
The link to this article is:
Online transactions using mobile agents need secure protocols to help these mobile agents to accomplish the transactions initiated by a client in electronic commerce. However, the mobile agent could encounter a hostile environment. For example, a server may compromise the mobile agent and try to obtain private information from the client. A solution to tackle this issue has been proposed. The existing solution is implemented using RSA signatures that result in long signatures and heavy workloads for the mobile agent. Mobile agents will migrate from the client to a server and from one server to another in order to accomplish the client's transaction plan. Therefore, it will be interesting to re-approach this issue. We present a new scheme for secure transactions using mobile agents in potentially hostile environments. This transaction scheme is implemented by using a new undetachable signature scheme. The new undetachable signature protocol utilizes short signatures, which is desirable for low-bandwidth and efficient mobile communications.
Showing items related by title, author, creator and subject.
Han, Song; Chang, Elizabeth; Dillon, Tharam S. (2005)Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile ...
Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidenceChang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...
Han, Song; Chang, Elizabeth; Dillon, Tharam S. (2005)This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. ...