Protecting the computation results of free-roaming agents

87Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When mobile agents do comparison shopping for their owners, they are subject to attacks of malicious hosts executing the agents. We present a family of protocols that protect the computation results established by free-roaming mobile agents. Our protocols enable the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent, thus providing forward integrity and truncation resilience. In an environment without public-key infrastructure, the protocols are based only on a secret hash chain. With a public-key infrastructure, the protocols also guarantee non-repudiability.

Cite

CITATION STYLE

APA

Karjoth, G., Asokan, N., & Gülcü, C. (1998). Protecting the computation results of free-roaming agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1477 LNCS, pp. 195–207). Springer Verlag. https://doi.org/10.1007/bfb0057659

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free