King, BrianYu, Min-ChiehSalama, PaulEl-Sharkawy, Mohamed A.2016-06-222016-06-222015-12-09https://hdl.handle.net/1805/10117http://dx.doi.org/10.7912/C2/2529Indiana University-Purdue University Indianapolis (IUPUI)There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.en-USMobile AgentE-commerceElectronic commerce -- Security measures -- Research -- MethodologyElectronic commerce -- Computer programs -- ResearchElectronic commerce -- PurchasingMobile commerce -- CryptographyMobile agents (Computer software) -- ResearchBusiness enterprises -- Computer networks -- Security measuresMobile computing -- Security measures -- ResearchComputer security -- ResearchA secure mobile agent e-commerce protocolThesis10.7912/C21G6V