Trees, cryptosignatures, and cyberspace mobile agent interfaces

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A basis for agent computing with intelligent languages and cryptosignatures trees is presented with applications to WWW interfaces. We present intelligent syntax and put forth intelligent tree computing. Multiagent signatures are defined and applied to define the basis for tree information-theoretic computing and agent cyberspace applications. The project is applicable to design multiagent protocol and has been applied to put forth cryptosignatures. The project has further led to foundations to computing with intelligent trees. Intelligent game trees are defined with chess playing examples and applications to cyberspace computing. Techniques for generating intelligent models are developed with soundness and completeness theorems abbreviated here with basis in our papers. The models can be applied as a basis to authentication on cyberspace computing. The WWW applications are summed by an authentication proposition. Agent computing has been applied in our papers and colleagues elsewhere to business and cyberspace commerce.

Cite

CITATION STYLE

APA

Nourani, C. F. (2019). Trees, cryptosignatures, and cyberspace mobile agent interfaces. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms (pp. 807–823). Springer International Publishing. https://doi.org/10.1007/978-3-030-22277-2_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free