Secure e-transactions protocol preserving privacy for customers and bidders
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Dillon, Tharam S. | |
dc.date.accessioned | 2017-01-30T15:15:50Z | |
dc.date.available | 2017-01-30T15:15:50Z | |
dc.date.created | 2008-11-12T23:21:50Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Han, S. and Chang, E. and Dillon, T. 2005. Secure e-transactions protocol preserving privacy for customers and bidders, in E-service Intelligence, pp. 307-326. Berlin / Heidelberg: Springer. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/44700 | |
dc.identifier.doi | 10.1007/978-3-540-37017-8_14 | |
dc.description.abstract |
Online transactions using mobile agents need secure protocols to help these mobile agents to accomplish the transactions initiated by a client in electronic commerce. However, the mobile agent could encounter a hostile environment. For example, a server may compromise the mobile agent and try to obtain private information from the client. A solution to tackle this issue has been proposed. The existing solution is implemented using RSA signatures that result in long signatures and heavy workloads for the mobile agent. Mobile agents will migrate from the client to a server and from one server to another in order to accomplish the client's transaction plan. Therefore, it will be interesting to re-approach this issue. We present a new scheme for secure transactions using mobile agents in potentially hostile environments. This transaction scheme is implemented by using a new undetachable signature scheme. The new undetachable signature protocol utilizes short signatures, which is desirable for low-bandwidth and efficient mobile communications. | |
dc.publisher | Springer | |
dc.subject | e-Transaction | |
dc.subject | Privacy | |
dc.subject | Short Signatures | |
dc.subject | Information Security | |
dc.subject | Mobile Agent | |
dc.subject | information systems | |
dc.subject | Virtual Community | |
dc.title | Secure e-transactions protocol preserving privacy for customers and bidders | |
dc.type | Book Chapter | |
dcterms.source.startPage | 307 | |
dcterms.source.endPage | 326 | |
dcterms.source.title | E-service Intelligence | |
dcterms.source.series | Studies in Computational Intelligence | |
dcterms.source.conference | International Conference on Computational Science and Engineering (ICCSE) | |
dcterms.source.conference-start-date | Jun 27 2005 | |
dcterms.source.conferencelocation | Istanbul, Turkey | |
dcterms.source.place | Berlin / Heidelberg | |
curtin.note |
The original publication is available at | |
curtin.note |
The link to this article is: | |
curtin.note |
| |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-657 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |