A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin.
by Lam Tak-Cheung. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 61-66). === Abstracts in English and Chinese. === Chapter 1. --- Introduction --- p.1 === Chapter 1.1 --- Evolution of the Mobile Agent Paradigm --- p.2 === Chapter 1.2 -...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
2002
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5891219 http://repository.lib.cuhk.edu.hk/en/item/cuhk-323978 |
id |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_323978 |
---|---|
record_format |
oai_dc |
collection |
NDLTD |
language |
English Chinese |
format |
Others
|
sources |
NDLTD |
topic |
Mobile agents (Computer software) Computer security Electronic funds transfers--Security measures |
spellingShingle |
Mobile agents (Computer software) Computer security Electronic funds transfers--Security measures A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
description |
by Lam Tak-Cheung. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 61-66). === Abstracts in English and Chinese. === Chapter 1. --- Introduction --- p.1 === Chapter 1.1 --- Evolution of the Mobile Agent Paradigm --- p.2 === Chapter 1.2 --- Beneficial Aspects of Mobile Agents --- p.3 === Chapter 1.3 --- Security Threats of Mobile Agents --- p.4 === Chapter 1.4 --- Organization of the Thesis --- p.6 === Chapter 2. --- Background of Cryptographic Theories --- p.7 === Chapter 2.1 --- Introduction --- p.7 === Chapter 2.2 --- Encryption and Decryption --- p.7 === Chapter 2.3 --- Six Cryptographic Primitives --- p.8 === Chapter 2.3.1 --- Symmetric Encryption --- p.8 === Chapter 2.3.2 --- Asymmetric Encryption --- p.9 === Chapter 2.3.3 --- Digital Signature --- p.9 === Chapter 2.3.4 --- Message Digest --- p.10 === Chapter 2.3.5 --- Digital Certificate --- p.11 === Chapter 2.3.6 --- Zero-Knowledge Proof --- p.11 === Chapter 2.4 --- RSA Public Key Cryptosystem --- p.12 === Chapter 2.5 --- Blind Signature --- p.13 === Chapter 2.6 --- Secret Sharing --- p.14 === Chapter 2.7 --- Conclusion Remarks --- p.14 === Chapter 3. --- Background of Mobile Agent Clones --- p.15 === Chapter 3.1 --- Introduction --- p.15 === Chapter 3.2 --- Types of Agent Clones --- p.15 === Chapter 3.3 --- Mobile Agent Cloning Problems --- p.16 === Chapter 3.4 --- Baek's Detection Scheme for Mobile Agent Clones --- p.17 === Chapter 3.4.1 --- The Main Idea --- p.17 === Chapter 3.4.2 --- Shortcomings of Baek's Scheme --- p.18 === Chapter 3.5 --- Conclusion Remarks --- p.19 === Chapter 4. --- Background of E-cash --- p.20 === Chapter 4.1 --- Introduction --- p.20 === Chapter 4.2 --- The General E-cash Model --- p.21 === Chapter 4.3 --- Chaum-Pedersen's General Transferable E-cash --- p.22 === Chapter 4.4 --- Ferguson's Single-term Off-line E-coins --- p.23 === Chapter 4.4.1 --- Technical Background of the Secure Tools --- p.24 === Chapter 4.4.2 --- Protocol Details --- p.27 === Chapter 4.5 --- Conclusion Remarks --- p.30 === Chapter 5. --- A Mobile Agent Clone Detection System using General Transferable E-cash --- p.31 === Chapter 5.1 --- Introduction --- p.31 === Chapter 5.2 --- Terminologies --- p.33 === Chapter 5.3 --- Mobile Agent Clone Detection System with Transferable E-cash --- p.34 === Chapter 5.4 --- Security and Privacy Analysis --- p.37 === Chapter 5.5 --- Attack Scenarios --- p.39 === Chapter 5.5.1 --- The Chosen Host Response Attack --- p.39 === Chapter 5.5.2 --- The Truncation and Substitution Attack --- p.40 === Chapter 5.6 --- An Alternative Scheme without Itinerary Privacy --- p.41 === Chapter 5.7 --- Conclusion Remarks --- p.43 === Chapter 6. --- Specific Implementation of the Mobile Agent Clone Detection System with Transferable Ferguson's E-coin --- p.45 === Chapter 6.1 --- Introduction --- p.45 === Chapter 6.2 --- The Clone Detection Environment --- p.46 === Chapter 6.3 --- Protocols --- p.48 === Chapter 6.3.2 --- Withdrawing E-tokens --- p.48 === Chapter 6.3.2 --- The Agent Creation Protocol --- p.51 === Chapter 6.3.3 --- The Agent Migration Protocol --- p.51 === Chapter 6.3.4 --- Clone Detection and Culprit Identification --- p.52 === Chapter 6.4 --- Security and Privacy Analysis --- p.54 === Chapter 6.5 --- Complexity Analysis --- p.55 === Chapter 6.5.1 --- Compact Passport --- p.55 === Chapter 6.5.2 --- Passport growth in size --- p.56 === Chapter 6.6 --- Conclusion Remarks --- p.56 === Chapter 7. --- Conclusions --- p.58 === Appendix 一 Papers derived from this thesis Bibliography |
author2 |
Lam, Tak-Cheung. |
author_facet |
Lam, Tak-Cheung. |
title |
A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
title_short |
A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
title_full |
A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
title_fullStr |
A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
title_full_unstemmed |
A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. |
title_sort |
mobile agent clone detection system using general transferable e-cash and its specific implementation with ferguson's e-coin. |
publishDate |
2002 |
url |
http://library.cuhk.edu.hk/record=b5891219 http://repository.lib.cuhk.edu.hk/en/item/cuhk-323978 |
_version_ |
1718982844086222848 |
spelling |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3239782019-02-26T03:34:43Z A mobile agent clone detection system using general transferable E-cash and its specific implementation with Ferguson's E-coin. Mobile agents (Computer software) Computer security Electronic funds transfers--Security measures by Lam Tak-Cheung. Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. Includes bibliographical references (leaves 61-66). Abstracts in English and Chinese. Chapter 1. --- Introduction --- p.1 Chapter 1.1 --- Evolution of the Mobile Agent Paradigm --- p.2 Chapter 1.2 --- Beneficial Aspects of Mobile Agents --- p.3 Chapter 1.3 --- Security Threats of Mobile Agents --- p.4 Chapter 1.4 --- Organization of the Thesis --- p.6 Chapter 2. --- Background of Cryptographic Theories --- p.7 Chapter 2.1 --- Introduction --- p.7 Chapter 2.2 --- Encryption and Decryption --- p.7 Chapter 2.3 --- Six Cryptographic Primitives --- p.8 Chapter 2.3.1 --- Symmetric Encryption --- p.8 Chapter 2.3.2 --- Asymmetric Encryption --- p.9 Chapter 2.3.3 --- Digital Signature --- p.9 Chapter 2.3.4 --- Message Digest --- p.10 Chapter 2.3.5 --- Digital Certificate --- p.11 Chapter 2.3.6 --- Zero-Knowledge Proof --- p.11 Chapter 2.4 --- RSA Public Key Cryptosystem --- p.12 Chapter 2.5 --- Blind Signature --- p.13 Chapter 2.6 --- Secret Sharing --- p.14 Chapter 2.7 --- Conclusion Remarks --- p.14 Chapter 3. --- Background of Mobile Agent Clones --- p.15 Chapter 3.1 --- Introduction --- p.15 Chapter 3.2 --- Types of Agent Clones --- p.15 Chapter 3.3 --- Mobile Agent Cloning Problems --- p.16 Chapter 3.4 --- Baek's Detection Scheme for Mobile Agent Clones --- p.17 Chapter 3.4.1 --- The Main Idea --- p.17 Chapter 3.4.2 --- Shortcomings of Baek's Scheme --- p.18 Chapter 3.5 --- Conclusion Remarks --- p.19 Chapter 4. --- Background of E-cash --- p.20 Chapter 4.1 --- Introduction --- p.20 Chapter 4.2 --- The General E-cash Model --- p.21 Chapter 4.3 --- Chaum-Pedersen's General Transferable E-cash --- p.22 Chapter 4.4 --- Ferguson's Single-term Off-line E-coins --- p.23 Chapter 4.4.1 --- Technical Background of the Secure Tools --- p.24 Chapter 4.4.2 --- Protocol Details --- p.27 Chapter 4.5 --- Conclusion Remarks --- p.30 Chapter 5. --- A Mobile Agent Clone Detection System using General Transferable E-cash --- p.31 Chapter 5.1 --- Introduction --- p.31 Chapter 5.2 --- Terminologies --- p.33 Chapter 5.3 --- Mobile Agent Clone Detection System with Transferable E-cash --- p.34 Chapter 5.4 --- Security and Privacy Analysis --- p.37 Chapter 5.5 --- Attack Scenarios --- p.39 Chapter 5.5.1 --- The Chosen Host Response Attack --- p.39 Chapter 5.5.2 --- The Truncation and Substitution Attack --- p.40 Chapter 5.6 --- An Alternative Scheme without Itinerary Privacy --- p.41 Chapter 5.7 --- Conclusion Remarks --- p.43 Chapter 6. --- Specific Implementation of the Mobile Agent Clone Detection System with Transferable Ferguson's E-coin --- p.45 Chapter 6.1 --- Introduction --- p.45 Chapter 6.2 --- The Clone Detection Environment --- p.46 Chapter 6.3 --- Protocols --- p.48 Chapter 6.3.2 --- Withdrawing E-tokens --- p.48 Chapter 6.3.2 --- The Agent Creation Protocol --- p.51 Chapter 6.3.3 --- The Agent Migration Protocol --- p.51 Chapter 6.3.4 --- Clone Detection and Culprit Identification --- p.52 Chapter 6.4 --- Security and Privacy Analysis --- p.54 Chapter 6.5 --- Complexity Analysis --- p.55 Chapter 6.5.1 --- Compact Passport --- p.55 Chapter 6.5.2 --- Passport growth in size --- p.56 Chapter 6.6 --- Conclusion Remarks --- p.56 Chapter 7. --- Conclusions --- p.58 Appendix 一 Papers derived from this thesis Bibliography Lam, Tak-Cheung. Chinese University of Hong Kong Graduate School. Division of Information Engineering. 2002 Text bibliography print vii, 66 leaves : ill. ; 30 cm. cuhk:323978 http://library.cuhk.edu.hk/record=b5891219 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A323978/datastream/TN/view/A%20%20mobile%20agent%20clone%20detection%20system%20using%20general%20transferable%20E-cash%20and%20its%20specific%20implementation%20with%20Ferguson%27s%20E-coin.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-323978 |