2004
DOI: 10.1007/978-3-540-24591-9_21
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Forward Integrity Protocol for Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2004
2004
2011
2011

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Reference [5] uses partial result encapsulation for chain association certification, use digital signatures and Hash function to form association between results of two hosts adjacent. Through this association the mechanism can prevent data changed maliciously, but it can not resist colluded truncation attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [5] uses partial result encapsulation for chain association certification, use digital signatures and Hash function to form association between results of two hosts adjacent. Through this association the mechanism can prevent data changed maliciously, but it can not resist colluded truncation attack.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [6] is an improvement of reference [5]. Data generated by agent on each host have relationship with data generated on consecutive two hosts before and after.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [2] uses partial result encapsulation for chain association certification, use digital signatures and Hash function to form association between results of two hosts adjacent. Through this association the mechanism can prevent data changed maliciously, but it cannot resist colluded truncation attack.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [3] is an improvement of reference [2]. Data generated by agent on each host have relationship with data generated on consecutive two hosts before and after.…”
Section: Related Workmentioning
confidence: 99%
“…Like KAG protocols, to reach the so called publicly verifiable forward integrity propriety, this protocol generates a pair of one time secret private and public keys at each host for its successor to use. As Yao et al [6] and Songsiri [7] point out, the security assurance relies on the assumption that the predecessor does not leak the secret key used by its successor. This requirement to potentially malicious hosts is not realistic.…”
Section: Related Workmentioning
confidence: 99%