Show simple item record

dc.contributor.authorHan, Song
dc.contributor.authorChang, Elizabeth
dc.contributor.authorDillon, Tharam S.
dc.date.accessioned2017-01-30T15:15:50Z
dc.date.available2017-01-30T15:15:50Z
dc.date.created2008-11-12T23:21:50Z
dc.date.issued2005
dc.identifier.citationHan, S. and Chang, E. and Dillon, T. 2005. Secure e-transactions protocol preserving privacy for customers and bidders, in E-service Intelligence, pp. 307-326. Berlin / Heidelberg: Springer.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/44700
dc.identifier.doi10.1007/978-3-540-37017-8_14
dc.description.abstract

Online transactions using mobile agents need secure protocols to help these mobile agents to accomplish the transactions initiated by a client in electronic commerce. However, the mobile agent could encounter a hostile environment. For example, a server may compromise the mobile agent and try to obtain private information from the client. A solution to tackle this issue has been proposed. The existing solution is implemented using RSA signatures that result in long signatures and heavy workloads for the mobile agent. Mobile agents will migrate from the client to a server and from one server to another in order to accomplish the client's transaction plan. Therefore, it will be interesting to re-approach this issue. We present a new scheme for secure transactions using mobile agents in potentially hostile environments. This transaction scheme is implemented by using a new undetachable signature scheme. The new undetachable signature protocol utilizes short signatures, which is desirable for low-bandwidth and efficient mobile communications.

dc.publisherSpringer
dc.subjecte-Transaction
dc.subjectPrivacy
dc.subjectShort Signatures
dc.subjectInformation Security
dc.subjectMobile Agent
dc.subjectinformation systems
dc.subjectVirtual Community
dc.titleSecure e-transactions protocol preserving privacy for customers and bidders
dc.typeBook Chapter
dcterms.source.startPage307
dcterms.source.endPage326
dcterms.source.titleE-service Intelligence
dcterms.source.seriesStudies in Computational Intelligence
dcterms.source.conferenceInternational Conference on Computational Science and Engineering (ICCSE)
dcterms.source.conference-start-dateJun 27 2005
dcterms.source.conferencelocationIstanbul, Turkey
dcterms.source.placeBerlin / Heidelberg
curtin.note

The original publication is available at http://www.springerlink.com

curtin.note

The link to this article is:

curtin.note

http://dx.doi.org/10.1007/978-3-540-37017-8_14

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-657
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record