Integrity assurance of mobile agents through public-key encryption and watermarking.
Noor-ul-QayyumFarooq AhmadPublished in: ICDIM (2008)
Keyphrases
- mobile agents
- public key encryption
- public key
- proxy re encryption
- client server
- mobile agent technology
- watermarking scheme
- copyright protection
- mobile computing
- agent technology
- watermarking algorithm
- intelligent agents
- distributed systems
- fault tolerance
- encryption scheme
- computing environments
- information security
- data integrity
- standard model
- end to end
- identity based encryption
- security model
- ciphertext
- relational databases
- query processing
- mobile agent system
- intelligent systems
- intrusion detection
- databases