Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 11
Abstract
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile agent’s security. A security issues with mobile agents have not been solved and are becoming obstacles for the application of mobile agents. Four threat categories are identified for mobile agent: threats stemming from an agent attacking an agent platform, an agent platform attacking an agent, an agent attacking another agent on the agent platform, and other entities attacking the agent system Homomorphic encryption are a technique in which the encrypted mobile codes can be executed directly on different platforms without decryption. In this paper section introduce the basic part of cryptosystem. In next section explain theory related Homomorphic Encryption. Section III contain the application view of Homomorphic Encryption used for mobile agent security and last conclude the paper.
Authors and Affiliations
Sachin Upadhye , P. G. Khot
A Review: Comparative Analysis Of Routing Protocols In Wireless Sensor Network
Wireless Sensor networks are recently rapidly growing research area in wireless communications and distributed network. Wireless Sensor Network consists of a large number of low-cost, low-power, and multifunctional...
Hybrid Algorithm PSO and SA in Achieving Partitioning Optimization for VLSI Applications
This paper includes a new partitioning algorithm for circuit bi-partitioning, used for the reduction of the number of interconnections between elements of VLSI circuit. In this paper, the hybrid PSO and SA algorith...
Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment
Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...
Software Code Clone Detection Using AST
The research which exists suggests that a considerable portion (10-15%) of the source code of large-scale computer programs is duplicate code. Detection and removal of such clones promises decreased software maintenance...
Artificial Intelligent Bionic Devices and Robotic Controls
Functionality and design of a bionic robot arm consisting of three joints driven by elastic and compliant actuators derived from biologically inspired principles are presented. In the first design standa...