• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 7 (1), 2008
  3. 24-31
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2008 | Volume: 7 | Issue: 1 | Page No.: 24-31
DOI: 10.3923/itj.2008.24.31

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 410

Search


Authors


Abid Khan

Country: China

Xiamu Niu

Country: China

Zhang Yong

Country: China

Keywords


  • data Integrity
  • watermarking
  • forward Integrity
  • non-repudiation
  • digital signature
  • genetic algorithm
  • truncation resilience
Research Article

A Robust Framework for Protecting Computation Results of Mobile Agents

Abid Khan, Xiamu Niu and Zhang Yong
A data integrity solution for mobile agents is presented. The proposed scheme combines digital watermarking and digital signature to achieve the desired security requirements of strong forward integrity, truncation resilience and non-repudiation. The results computed at each hop are first watermarked and then digitally signed. When the agent returns to the home platform we verify the signature first and then extract watermark. Any tampering with the results can be determined in the verification process. We have implemented the proposed scheme with various hashing algorithms like SHA-1, SHA-256 and SHA-512 for a price comparison scenario. For digital signature we have used RSA based signature. We have applied t-test to check the significance of present results. Present experimental results suggest that it can be used in an e-commerce application.
PDF Fulltext XML References Citation

How to cite this article

Abid Khan, Xiamu Niu and Zhang Yong, 2008. A Robust Framework for Protecting Computation Results of Mobile Agents. Information Technology Journal, 7: 24-31.

DOI: 10.3923/itj.2008.24.31

URL: https://scialert.net/abstract/?doi=itj.2008.24.31

Related Articles

A Visible Watermarking Scheme in Spatial Domain Using HVS Model
Quantization based Semi-fragile Watermarking Scheme for H.264 Video
A Blind Image Watermarking Scheme Using Fast Hadamard Transform
Multipurpose Perceptual Image Hashing Based on Block Truncation Coding
An Image Hashing Scheme based on Mean-removed Vector Quantization for Multiple Purposes

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved