<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iuon-Chang Lin</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Enhancement for Anonymous Secure e-Voting over a Network</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Standards &amp; Interfaces</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">131-139</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iuon-Chang Lin</style></author><author><style face="normal" font="default" size="100%">Hsia-Hung Ou</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two Secure Transportation Schemes for Mobile Agents</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Mobile agents</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">secure transportation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">87-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Mobile agents are a new emerging popular research topic. Nowadays, the mobile agents are widely spread and implemented on the Internet. Application areas of mobile agents include electronic commerce, electronic marketing, enterprise information systems, etc. Since all the information about a mobile agent is transported over the Internet, the security policies become very important. However, the transportation security is usually neglected. In this paper, we propose two secure transportation schemes for mobile agents. They can prevent all possible attacks during the process of transporting agents. Furthermore, users can choose the best transportation scheme according to the system's scale.</style></abstract></record></records></xml>