Hybrid Approach for Secure Mobile Agent Computations [chapter]

J. Todd McDonald
2006 Lecture Notes in Computer Science  
Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures-benefiting greatly from schemes where cryptographic protocols are utilized. We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. We examine the strengths and weaknesses of such techniques and pose hybrid schemes which reduce communication overhead and maintain flexibility in the application of particular protocols.
doi:10.1007/11801412_5 fatcat:carpt5cu6zd4hegny7zurmx6pi