2015
DOI: 10.14257/ijsia.2015.9.5.02
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…In this part, we will compare our solution with two others based also on a set of cryptographic algorithms. First H. Idrissi et al [16] proposed a very inspiring and interesting solution based on Identity-Based Key Agreement Protocol and Advanced Standard Encryption (AES) which is a symmetric-Key algorithm. The execution time of this solution is 55ms which is less than our execution time, this is justified by the use of symmetric cryptography which is an old technique uses a single key that needs to be shared among the parts who need to receive the message.…”
Section: Fig 15 Timing Results Obtained In the Execution Of Differementioning
confidence: 99%
See 1 more Smart Citation
“…In this part, we will compare our solution with two others based also on a set of cryptographic algorithms. First H. Idrissi et al [16] proposed a very inspiring and interesting solution based on Identity-Based Key Agreement Protocol and Advanced Standard Encryption (AES) which is a symmetric-Key algorithm. The execution time of this solution is 55ms which is less than our execution time, this is justified by the use of symmetric cryptography which is an old technique uses a single key that needs to be shared among the parts who need to receive the message.…”
Section: Fig 15 Timing Results Obtained In the Execution Of Differementioning
confidence: 99%
“…Sampathkumar [17] proposed solutions based on public key authentication technique and cryptography to address some of security problems in Mobile agent technology, they present also an experimental application by using RSA algorithm to encryption and decryption. Idrissi et al [16] introduce an approach based on Identity-Based Key Agreement Protocol to get a session key and to ensure authentication, an Advanced Standard Encryption (AES) for the confidentiality of data exchanged, as well as a Binary Serialization. Unfortunately, we noticed that in literature the most cryptographic approaches and solutions for Mobile-Agent security are based on the classical Cryptosystem like AES, RSA...…”
Section: A Mobile Agent Security Solutionsmentioning
confidence: 99%