by Lam Tak-Cheung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 61-66). / Abstracts in English and Chinese. / Chapter 1. --- Introduction --- p.1 / Chapter 1.1 --- Evolution of the Mobile Agent Paradigm --- p.2 / Chapter 1.2 --- Beneficial Aspects of Mobile Agents --- p.3 / Chapter 1.3 --- Security Threats of Mobile Agents --- p.4 / Chapter 1.4 --- Organization of the Thesis --- p.6 / Chapter 2. --- Background of Cryptographic Theories --- p.7 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Encryption and Decryption --- p.7 / Chapter 2.3 --- Six Cryptographic Primitives --- p.8 / Chapter 2.3.1 --- Symmetric Encryption --- p.8 / Chapter 2.3.2 --- Asymmetric Encryption --- p.9 / Chapter 2.3.3 --- Digital Signature --- p.9 / Chapter 2.3.4 --- Message Digest --- p.10 / Chapter 2.3.5 --- Digital Certificate --- p.11 / Chapter 2.3.6 --- Zero-Knowledge Proof --- p.11 / Chapter 2.4 --- RSA Public Key Cryptosystem --- p.12 / Chapter 2.5 --- Blind Signature --- p.13 / Chapter 2.6 --- Secret Sharing --- p.14 / Chapter 2.7 --- Conclusion Remarks --- p.14 / Chapter 3. --- Background of Mobile Agent Clones --- p.15 / Chapter 3.1 --- Introduction --- p.15 / Chapter 3.2 --- Types of Agent Clones --- p.15 / Chapter 3.3 --- Mobile Agent Cloning Problems --- p.16 / Chapter 3.4 --- Baek's Detection Scheme for Mobile Agent Clones --- p.17 / Chapter 3.4.1 --- The Main Idea --- p.17 / Chapter 3.4.2 --- Shortcomings of Baek's Scheme --- p.18 / Chapter 3.5 --- Conclusion Remarks --- p.19 / Chapter 4. --- Background of E-cash --- p.20 / Chapter 4.1 --- Introduction --- p.20 / Chapter 4.2 --- The General E-cash Model --- p.21 / Chapter 4.3 --- Chaum-Pedersen's General Transferable E-cash --- p.22 / Chapter 4.4 --- Ferguson's Single-term Off-line E-coins --- p.23 / Chapter 4.4.1 --- Technical Background of the Secure Tools --- p.24 / Chapter 4.4.2 --- Protocol Details --- p.27 / Chapter 4.5 --- Conclusion Remarks --- p.30 / Chapter 5. --- A Mobile Agent Clone Detection System using General Transferable E-cash --- p.31 / Chapter 5.1 --- Introduction --- p.31 / Chapter 5.2 --- Terminologies --- p.33 / Chapter 5.3 --- Mobile Agent Clone Detection System with Transferable E-cash --- p.34 / Chapter 5.4 --- Security and Privacy Analysis --- p.37 / Chapter 5.5 --- Attack Scenarios --- p.39 / Chapter 5.5.1 --- The Chosen Host Response Attack --- p.39 / Chapter 5.5.2 --- The Truncation and Substitution Attack --- p.40 / Chapter 5.6 --- An Alternative Scheme without Itinerary Privacy --- p.41 / Chapter 5.7 --- Conclusion Remarks --- p.43 / Chapter 6. --- Specific Implementation of the Mobile Agent Clone Detection System with Transferable Ferguson's E-coin --- p.45 / Chapter 6.1 --- Introduction --- p.45 / Chapter 6.2 --- The Clone Detection Environment --- p.46 / Chapter 6.3 --- Protocols --- p.48 / Chapter 6.3.2 --- Withdrawing E-tokens --- p.48 / Chapter 6.3.2 --- The Agent Creation Protocol --- p.51 / Chapter 6.3.3 --- The Agent Migration Protocol --- p.51 / Chapter 6.3.4 --- Clone Detection and Culprit Identification --- p.52 / Chapter 6.4 --- Security and Privacy Analysis --- p.54 / Chapter 6.5 --- Complexity Analysis --- p.55 / Chapter 6.5.1 --- Compact Passport --- p.55 / Chapter 6.5.2 --- Passport growth in size --- p.56 / Chapter 6.6 --- Conclusion Remarks --- p.56 / Chapter 7. --- Conclusions --- p.58 / Appendix 一 Papers derived from this thesis Bibliography
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_323978 |
Date | January 2002 |
Contributors | Lam, Tak-Cheung., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, vii, 66 leaves : ill. ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0017 seconds