Privacy-preserving transactions protocol using mobile agents with mutual authentication
This article introduces a new transaction protocol using mobile agents in electronic commerce. The authors first propose a new model for transactions in electronic commerce mutual authenticated transactions using mobile agents. They then design a new protocol by this model. Furthermore, the authors...
| Main Authors: | Han, Song, Potdar, Vidyasagar, Chang, Elizabeth, Dillon, Tharam S. |
|---|---|
| Format: | Journal Article |
| Published: |
IGI Global
2007
|
| Subjects: | |
| Online Access: | http://www.igi-pub.com/journals/details.asp?id=5679 http://hdl.handle.net/20.500.11937/42458 |
Similar Items
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Repacking ‘privacy’ for a networked world
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Similar Items
-
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005) -
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005) -
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)