Mobile agent watermarking (MAW): security properties and attacks revisited.
Abid KhanXiamu NiuWaqas AnwarMansoor AhmedAli Nawaz KhanPublished in: FIT (2009)
Keyphrases
- mobile agents
- security properties
- security protocols
- watermarking scheme
- cryptographic protocols
- security vulnerabilities
- watermarking algorithm
- watermarking technique
- security requirements
- security mechanisms
- formal model
- mobile agent system
- client server
- mobile agent technology
- security analysis
- distributed systems
- fault tolerance
- agent technology
- dos attacks
- formal methods
- key management
- intelligent agents
- data mining
- rfid tags
- standard model
- mobile computing
- smart card
- wireless networks
- expert systems