554 Hits in 4.8 sec

An Agent-Based Auction Protocol on Mobile Devices

Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen
2014 Journal of Applied Mathematics  
This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating  ...  The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.  ...  The method was based on the concept in [7, 8] , where group signature technology was utilized in English auction protocol to offer bidders higher security.  ... 
doi:10.1155/2014/314180 fatcat:pzdb5yfiizglldpgrxxuuwkgyq

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

2016 KSII Transactions on Internet and Information Systems  
To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret  ...  s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction.  ...  According to their scheme, it can permit bidders take part in electronic auctions via a mobile agent.  ... 
doi:10.3837/tiis.2016.12.025 fatcat:ajjuoa2ajfh4feiskwluud5hhe

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang
2016 Journal of Electrical and Computer Engineering  
The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.  ...  Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users' privacy.  ...  [12] proposed an anonymous auction scheme based on the ring signature.  ... 
doi:10.1155/2016/6567146 fatcat:w6au6u26qjd4xbdmdxuvk2vjrq

When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges [article]

Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
2021 arXiv   pre-print
On the one hand, the decentralized nature of blockchain can provide a trustworthy, secure, and cost-effective mechanism to manage the auction process; on the other hand, auction models can be utilized  ...  to design incentive and consensus protocols in blockchain architectures.  ...  run secure MPC protocols off-chain. [203] A blockchain-based fair and secure MPC model for double auctions.  ... 
arXiv:2110.12534v1 fatcat:tpy2cv7sz5dc3dpchnmrniab5e

(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions

Joris Claessens, Bart Preneel, Joos Vandewalle
2003 ACM Transactions on Internet Technology  
In particular, a state-of-the-art survey of mobile agent-based secure electronic transactions is presented.  ...  This article investigates if and how mobile agents can execute secure electronic transactions on untrusted hosts. An overview of the security issues of mobile agents is first given.  ...  The authors also wish to express their gratitude to Keith Martin who provided very helpful native English support.  ... 
doi:10.1145/643477.643479 fatcat:uix6hvsrf5hdfo5wgredip6xpi

Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

Yang Shi, Jie Lin, Guoyue Xiong, Xiaoping Wang, Hongfei Fan
2016 Mobile Information Systems  
From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce.  ...  Considering the security of both the customers' hosts and the eShops' servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital  ...  Mobile Information Systems  ... 
doi:10.1155/2016/4375072 fatcat:gay3xjkqjjbghckf4nfirmnwqq

Market-based resource control for mobile agents

Jonathan Bredin, David Kotz, Daniela Rus
1998 Proceedings of the second international conference on Autonomous agents - AGENTS '98  
We discuss a system for controlling the activities of mobile agents that uses electronic cash, a banking system, and a set of resource managers. We describe protocols for transactions between agents.  ...  Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resources.  ...  Acknowledgments This paper describes research done in the Transportable Agents Laboratory at Dartmouth.  ... 
doi:10.1145/280765.280801 dblp:conf/agents/BredinKR98 fatcat:dgeya2apebfilp4vvzdsdgy3iq

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
While the security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers  ...  This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks.  ...  the TLC method and signed by using the Nyberg-Rueppel signature scheme.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce

Raja Al-Jaljouli, Jemal Abawajy, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi
2018 IEEE Transactions on Services Computing  
My research on the security of data exchanged during e-Negotiation had strengthened my belief in the unique power of Allah Almighty who has full knowledge of past, current and even future events and also  ...  Background to Security of Mobile Agent-based System Participants in mobile agent-based system are not always trusted.  ...  Existing Security Protocols for e-Negotiation There has been limited work on the security of mobile-agent based e-Negotiation.  ... 
doi:10.1109/tsc.2016.2560160 fatcat:m7mjxegydffbvm6synalhs5swm

Information agent technology for the Internet: A survey

Matthias Klusch
2001 Data & Knowledge Engineering  
Based on a systematic classification of intelligent information agents this paper presents an overview of basic key enabling technologies needed to build such agents, and respective examples of information  ...  In the latter case, the use of an agent communication language has to be considered on top of, for example, middleware platforms or specific APIs.  ...  Prominent auction protocols include the • first-price, open-cry, so-called English auction.  ... 
doi:10.1016/s0169-023x(00)00049-5 fatcat:pzgmrncj4zdi7ejszxt3d7vkp4

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
Furthermore, we consider the use of some pricing models in Machine-to-Machine (M2M) communication.  ...  ., data collection, topology formation, packet forwarding, resource and power optimization, coverage optimization, efficient task allocation, and security.  ...  DoS Attack Prevention The authors in [223] proposed a secure sensor network routing protocol based on a first-price sealed-bid auction to isolate malicious sensors.  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe

Actual Condition and Issues for Mobile Security System

Kouichi Sakurai, Kazuhide Fukushima
2007 Journal of Information Processing Systems  
This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.  ...  The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology.  ...  Star-Based Structure The group key-management protocols in RFC2093 and RFC2094, and the scheme based on star key graph uses a logical star-based structure. Fig. 5 shows the star-based structure.  ... 
doi:10.3745/jips.2008.3.2.054 fatcat:ipq2gx2dcjfojdmgmtp6owvv3y

Software Review

David R. Green
1998 The Cartographic Journal  
In Telescript primitive security features are implemented as authenticated identities, protected (read only) references, permits (a form of capability), secure channels and engine-mediated protocols for  ...  Aglets is a comprehensive mobile agent system with the following features: 1. A globally unique naming scheme for agents (navigation/security model). 2.  ...  It reviews a couple of enabling technologies on which a mobile agent system is built, and then proceeds to review three of the most important mobile agent systems in use today.  ... 
doi:10.1179/000870498786962790 fatcat:yy2f3jmtfjbt5eqmtfpk7k2tgi

Information technology and e-risk of supply chain management

N Varma T, Khan D A
2015 African Journal of Business Management  
We know that technology is always a double-edged sword which can be reciprocally used for prevention of e-risks in SCM.  ...  This growth of Information Technology in SCM has changed the paper based environment to Virtual Supply Chain, which is also generating electronic risks (e-risks) in form of cybercrime or fraud.  ...  Moreover, a secure mobile agent must protect both the hosts and the agents from tampering by malicious activities.  ... 
doi:10.5897/ajbm2013.7308 fatcat:qgqthj53rrgvhouxvuez5axhky

Quantum Cryptography: Key Distribution and Beyond

Akshata Shenoy-Hejamadi, Anirban Pathak, Srikanth Radhakrishna
2017 Quanta  
Specifically, sealed-bid auctions [92] [93] [94] and other variants of auctioning (e.g., English and Dutch auctions) can be perfromed using quantum resources [95, 96] .  ...  Hash-based signatures. This includes schemes for digital signatures constructed using hash functions [393] [394] [395] .  ... 
doi:10.12743/quanta.v6i1.57 fatcat:nwczh5zqjjch3abhrpcjb34ry4
« Previous Showing results 1 — 15 out of 554 results