Secure electronic commerce with mobile agents
Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile environment. For example, a server may compromise the mobile agent and try to obt...
| Main Authors: | Han, Song, Chang, Elizabeth, Dillon, Tharam S. |
|---|---|
| Format: | Conference Paper |
| Published: |
United Daily News Digital Co.
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/17152 |
Similar Items
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Governance for e-learning ecosystem
by: Chang, Vanessa, et al.
Published: (2008)
by: Chang, Vanessa, et al.
Published: (2008)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A methodology for transactional risk assessment and decision making in e-business interactions
by: Hussain, Omar, et al.
Published: (2009)
by: Hussain, Omar, et al.
Published: (2009)
Risk in decentralised communications
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Towards defining risk in decentralised communications
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Trustworthiness measurement methodology for e-business
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Applying a fuzzy trust model to e-commerce systems
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003)
by: Elmadani, Ahmed Baba
Published: (2003)
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Building a fuzzy trust network in unsupervised multi-agent environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Quantifying risk in financial terms in an e-transaction.
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Community Perception of Mobile Payment in e-Government Services
by: Ahsan, A., et al.
Published: (2012)
by: Ahsan, A., et al.
Published: (2012)
Similar Items
-
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005) -
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005) -
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007) -
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005) -
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)