Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...