2017
DOI: 10.1063/1.5005364
|View full text |Cite
|
Sign up to set email alerts
|

Multi-agent integrated password management (MIPM) application secured with encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Decent efforts have been also made to deploy intelligent agents on the network: Alert management : Moummadi et al (2014) proposed to use a Multi-Agent approach to manage network alerts and offer remote monitoring and real-time notification in mobile devices. The architecture uses eight types of agents that work together to detect, classify events and send notification of failures and impending problems to users' mobile phones. Password management : In a different problem, mobile agents were used to manage the user's passwords by developing an application which hosts two Agent profiles: a crypto Agent which encrypts the stored password using the advanced encryption standard (AES) algorithm, and an application agent that acts as a third-party software in between the password management application and the crypto agent during the process of encryption and decryption (Awang et al , 2017). …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Decent efforts have been also made to deploy intelligent agents on the network: Alert management : Moummadi et al (2014) proposed to use a Multi-Agent approach to manage network alerts and offer remote monitoring and real-time notification in mobile devices. The architecture uses eight types of agents that work together to detect, classify events and send notification of failures and impending problems to users' mobile phones. Password management : In a different problem, mobile agents were used to manage the user's passwords by developing an application which hosts two Agent profiles: a crypto Agent which encrypts the stored password using the advanced encryption standard (AES) algorithm, and an application agent that acts as a third-party software in between the password management application and the crypto agent during the process of encryption and decryption (Awang et al , 2017). …”
Section: Related Workmentioning
confidence: 99%
“…Password management : In a different problem, mobile agents were used to manage the user's passwords by developing an application which hosts two Agent profiles: a crypto Agent which encrypts the stored password using the advanced encryption standard (AES) algorithm, and an application agent that acts as a third-party software in between the password management application and the crypto agent during the process of encryption and decryption (Awang et al , 2017).…”
Section: Related Workmentioning
confidence: 99%