Novel mobile agent dynamic data integrity protection protocol
Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect th...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2007-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74658864/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537484199034880 |
---|---|
author | LI Peng-fei1 QING Si-han2 MA Heng-tai1 DENG Yong1 |
author_facet | LI Peng-fei1 QING Si-han2 MA Heng-tai1 DENG Yong1 |
author_sort | LI Peng-fei1 |
collection | DOAJ |
description | Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method. |
format | Article |
id | doaj-art-b48db1171e984ef2b20fb01f243e9618 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2007-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b48db1171e984ef2b20fb01f243e96182025-01-14T08:34:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2007-01-0111074658864Novel mobile agent dynamic data integrity protection protocolLI Peng-fei1QING Si-han2MA Heng-tai1DENG Yong1Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.http://www.joconline.com.cn/zh/article/74658864/mobile agentsfree-roamingtruncation resiliencedata integrity |
spellingShingle | LI Peng-fei1 QING Si-han2 MA Heng-tai1 DENG Yong1 Novel mobile agent dynamic data integrity protection protocol Tongxin xuebao mobile agents free-roaming truncation resilience data integrity |
title | Novel mobile agent dynamic data integrity protection protocol |
title_full | Novel mobile agent dynamic data integrity protection protocol |
title_fullStr | Novel mobile agent dynamic data integrity protection protocol |
title_full_unstemmed | Novel mobile agent dynamic data integrity protection protocol |
title_short | Novel mobile agent dynamic data integrity protection protocol |
title_sort | novel mobile agent dynamic data integrity protection protocol |
topic | mobile agents free-roaming truncation resilience data integrity |
url | http://www.joconline.com.cn/zh/article/74658864/ |
work_keys_str_mv | AT lipengfei1 novelmobileagentdynamicdataintegrityprotectionprotocol AT qingsihan2 novelmobileagentdynamicdataintegrityprotectionprotocol AT mahengtai1 novelmobileagentdynamicdataintegrityprotectionprotocol AT dengyong1 novelmobileagentdynamicdataintegrityprotectionprotocol |