Agent Protection Based on the Use of Cryptographic Hardware.
Antonio MuñozAntonio MañaRajesh HarjaniMarioli MontenegroPublished in: COMPSAC (2) (2009)
Keyphrases
- protection schemes
- protection scheme
- multi agent systems
- multi agent
- random number generator
- hardware and software
- autonomous agents
- privacy protection
- intelligent agents
- multiagent systems
- computer systems
- computing systems
- agent architecture
- decision making
- smart card
- mobile agents
- operating system
- access control
- low cost
- decision theoretic
- agent model
- software agents
- embedded systems
- agent technology
- computing power
- key management
- agent systems
- security protocols
- image processing
- hardware implementation
- cognitive agents
- real time