In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are di...
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...