When mobile agents do comparison shopping for their owners, they are subject to attacks of malicious hosts executing the agents. We present a family of protocols that protect the computation results established by free-roaming mobile agents. Our protocols enable the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent, thus providing forward integrity and truncation resilience. In an environment without public-key infrastructure, the protocols are based only on a secret hash chain. With a public-key infrastructure, the protocols also guarantee non-repudiability.
CITATION STYLE
Karjoth, G., Asokan, N., & Gülcü, C. (1998). Protecting the computation results of free-roaming agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1477 LNCS, pp. 195–207). Springer Verlag. https://doi.org/10.1007/bfb0057659
Mendeley helps you to discover research relevant for your work.