Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of South China University of Technology(Natural Science Edition)》 2007-01
Add to Favorite Get Latest Update

Securely Alternative Route Protocol Based on Mobile Agents

Liu Yi Zhang Ling(Guangdong Key Laboratory of Computer Network,South China Univ.of Tech.,Guangzhou 510640,Guangdong,China)  
In order to effectively and securely protect the route of mobile Agents,a securely alternative route protocol based on mobile agents is first presented by means of the atomic encryption and signature.Then,the security and computational complexity of the protocol are analyzed.The results show that the proposed protocol not only sa-tisfies all general security properties for alternative route based on mobile Agents but also reduces the computational complexity from O(n~2) to O(n) in both Agent owners and hosts,as compared with the only method based on the nested encryption,and that the new protocol is of good expansibility.
【Fund】: 广东省信息安全技术重点实验室开放基金资助项目
【CateGory Index】: TN929.5;TN918
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 XING Wei-ning(Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China);Research about Mobile Agent in Grid Compute[J];Computer Knowledge and Technology;2010-06
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Liu Yi Xu Wen-li Wang Yu-min(State Key Laboratory of Integrated Service Networks, Xidian Univ., Xi’an 710071, Shaanxi, China);A Secure Payment Protocol Using Mobile Agents Based on Verifiable Secret Sharing[J];Journal of South China University of Technology(Natural Science);2005-06
2 WANG Ru-Chuan 1),2) LI Ying 1) XU Xiao-Long 1) ZHANG Qi n 1) 1)(Department of Computer Science and Technology , Nanjing University of Post and Telecommunications, Nanjing 210003) 2)(State Key Laboratory for Novel Software Technology, Nanjing Univ ersity, Nanjing 210093);The Research of Dynamic Routing Algorithm Based on Mobile Agent[J];Chinese Journal of Computers;2005-03
3 LIU Yi WU Qian-Hong WANG Yu-Min (National Key Laboratory of Integrated Service Networks, Xidian University, Xi ′an 710071);Flexible Itinerary Protection Based on Mobile Agents[J];Chinese Journal of Computers;2005-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Rao Yuan Wang Ruchuan Lin Ping (Institution of Information Network Technology, Nanjing University of Post and Telecommunications, Nanjing 210003, China);Satellite network routing algorithm based on mobile agent simulated in ns2[J];Journal of Southeast University(Natural Science Edition);2008-S1
2 Li Hui-xian~1 Cheng Chun-tian~2 Pang Liao-jun~3(1.Dept.of Computer Science and Engineering,Dalian Univ.of Tech.,Dalian 116024,Liaoning,China;2.Institute of Hydropower System and Hydroinformatics,Dalian Univ.of Tech., Dalian 116024,Liaoning,China;3.National Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi'an 710071,Shaanxi,China);Multi-Secret Sharing Scheme with General Access Structures[J];Journal of South China University of Technology(Natural Science Edition);2006-06
3 Lu Ming-xin Fu Xiao-tong Zhang Ning Xiao Guo-zhen (State Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi'an 710071,Shaanxi,China);Secret Sharing-Multisignature Scheme Without a Trusted Center[J];Journal of South China University of Technology(Natural Science Edition);2007-01
4 Wang Tian-yin Wen Qiao-yan(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);Cryptanalysis of Secret-Sharing Multi-Signature Scheme Without Trusted Centre[J];Journal of South China University of Technology(Natural Science Edition);2008-09
5 LIU Yi1,2 ZHANG Ling1 (South China University of Technology, Guangdong Key Laboratory of Computer Network, Guangzhou 510640)1 (Sun Yat-sen University, Guangdong Province Key Laboratory of Information Security, Guangzhou 510275)2;A Securely Set Itinerary Protocol of Mobile Agents[J];Computer Science;2007-01
6 TIAN Xu1, LIU Ren-jin2, CHEN Ming-hua2 (1. Modem Education Technological Center, West Anhui University, Lu’an 237012; 2. Department of Computer Science & Technology, West Anhui University, Lu’an 237012);Provable Security Mobile Agent Routing Protocol[J];Computer Engineering;2008-07
7 DONG Xiang-jun1,2,SHI Hao-shan1,JIANG Fei1,3,ZHAO Yong-hui1(1.School of Electronic and Information,Northwestern Polytechnical University,Xi’an 710072;2.Institute of Scientific & Technical Information of Equipment Academy of Air Force,Beijing 100000;3.Department of the Fourth,Xi’an Communication College of the PLA,Xi’an 710106);Improved GA-based Mobile Agent Routing Algorithm[J];Computer Engineering;2008-24
8 Yang Yun1,2 Liu Jun1 Zhou Jian1 Lu Lu1 Tao Bilei1 Liu Fengyu2 1(College of Information Engineering,Yangzhou University,Yangzhou,225009,Jiangsu,China)2(Postdoctoral Mobile on Computer Application,Nanjing University of Science and Technology,Nanjing 210004,Jiangsu,China);AN AGENT-BASED DISTRIBUTED QOS MULTICAST ROUTING ALGORITHM[J];Computer Applications and Software;2009-02
9 SHI Wen-wen1,WANG Ru-chuan2,XU Xiao-long2 1.College of Software,Nanjing University of Posts and Telecommunications,Nanjing 210003,China2.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210046,China;The Design of Dynamic Routing Algorithm Based on the Security of Mobile Agent[J];Journal of Nanjing University of Posts and Telecommunications(Natural Science);2009-05
10 LIU Yi1 DING Yong2 PANG Liao-jun3(Faculty of Computer,Guangdong University of Technology,Guangzhou 510006,China)1(School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China)2 (National Key Laboratory on Integrated Services Networks,Xidian University,Xi'an 710071,China)3;Secure Itinerary Protection Based on Mobile Agents[J];Computer Science;2009-11
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Liu Yiwen Li Weiqin (School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China) Wei Wei (Information Security Laboratory,Legend Corporation of R&D, Beijing 100085, China);Study of grid security architecture[J];Journal of Beijing University of Aeronautics and Astronautics;2003-07
2 LUO Man (Department of Computer Science, Shunde Vocational & Technological College, Shunde 528300, China);Solving the Mobile Agent’s Repeat Attack Problem by Using the Relatively Prime Incremental Timestamp[J];Journal of Huzhou Teachers College;2007-01
3 Shi Ke Dai Feng Shi Xuanhua Tao YongcaiCollege of Computer Science and Technology,Huazhong University ofScience and Technology,Wuhan 430074,China);Application of grid resource broker to the interoperation in heterogeneous grid systems[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2007-11
4 TAN Xiang, GU Yu Qing, and BAO Chong Ming (Institute of Software, Chinese Academy of Sciences, Beijing 100080);A Survey of Security Research in Mobile Agent Systems[J];Journal of Computer Research and Development;2003-07
5 LIU Li-Min and ZHA Li (Software Laboratory, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080);Study and Design of Grid User Management Architecture[J];Journal of Computer Research and Development;2004-12
6 Ren Xiaoming,Yang Dajian (IHEP of the Chinese Academy of Science,Beijing 100039);Analysis of Mobile Agent Architecture[J];Computer Engineering and Applications;2001-01
7 ;The New Development of Smart Card——An Overview to JavaCard[J];Computer Science;2001-07
8 LIU Yi1,2 ZHANG Ling1 (South China University of Technology, Guangdong Key Laboratory of Computer Network, Guangzhou 510640)1 (Sun Yat-sen University, Guangdong Province Key Laboratory of Information Security, Guangzhou 510275)2;A Securely Set Itinerary Protocol of Mobile Agents[J];Computer Science;2007-01
9 WANG Ru-Chuan XU Xiao-Long ZHENG Xiao-Yan SUN Zhi-Xin(Department of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003);The Research of Security Mechanism Model of Mobile Agent[J];Chinese Journal of Computers;2002-12
10 LIU Yi~(1,2),ZHANG Ling~1(1.Guangdong Key Laboratory of Computer Network,South China University of Technology,Guangzhou Guangdong 510640,China;2.Guangdong Province Key Laboratory of Information Security,Sun Yat-sen University,Guangzhou Guangdong 510275,China);A secure method of mobile agent data protection[J];Journal of Computer Applications;2006-09
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 ZHANG Fu-tai 1,ZHAO Fu-xiang 2, WANG Yu-min 2 (1.School of Mathematics and Computer Science,Nanjing Normal University,Nanjing,Jiangsu,210097,China; 2.Key Lab.On ISN,Xidian University,Xi'an,Shaanxi,710071,China);Verifiable Secret Sharing and Its Applications[J];Acta Electronica Sinica;2002-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved