Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Ming YaoKun PengMatthew HenricksenErnest FooEd DawsonPublished in: EC-Web (2004)
Keyphrases
- mobile agents
- distributed data mining
- load balancing
- client server
- distributed computing
- mobile agent technology
- distributed systems
- fault tolerance
- network management
- black hole
- agent technology
- intelligent agents
- mobile computing
- mobile agent system
- mobile environments
- computing environments
- virtual enterprise
- cooperative
- mobile users
- middleware architecture
- message delivery
- black hole search