Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS 


Vol. 31,  No. 6, pp. 651-657, Jun.  2006


PDF
  Abstract

This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network, which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

C. Jung and H. Yoon, "Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS," The Journal of Korean Institute of Communications and Information Sciences, vol. 31, no. 6, pp. 651-657, 2006. DOI: .

[ACM Style]

Chang-ryul Jung and Hong-sang Yoon. 2006. Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS. The Journal of Korean Institute of Communications and Information Sciences, 31, 6, (2006), 651-657. DOI: .

[KICS Style]

Chang-ryul Jung and Hong-sang Yoon, "Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS," The Journal of Korean Institute of Communications and Information Sciences, vol. 31, no. 6, pp. 651-657, 6. 2006.