期刊文献+

Anonymous Authentication for Secure Mobile Agent Based Internet Business

Anonymous Authentication for Secure Mobile Agent Based Internet Business
在线阅读 下载PDF
导出
摘要 Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly. Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly.
作者 Sivaraman Audithan Thanjavur Swaminathan Murunya Pandi Vijayakumar Sivaraman Audithan;Thanjavur Swaminathan Murunya;Pandi Vijayakumar(Department of Electronics and Communication Engineering, P.R. Engineering College, Thanjavur, India;Department of Computer Science and Engineering, P.R. Engineering College, Thanjavur, India;Department of Computer Science and Engineering, University College of Engineering, Tindivanam, Tamil Nadu, India)
出处 《Circuits and Systems》 2016年第8期1421-1429,共9页 电路与系统(英文)
关键词 Mobile Agents AUTHENTICATION Elliptic Curve Digital Signature Computational Time Servers Mobile Agents Authentication Elliptic Curve Digital Signature Computational Time Servers
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部