<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-30T22:21:17Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/4726" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/4726</identifier>
        <datestamp>2021-12-13T02:25:35Z</datestamp>
        <setSpec>1582963302567:1597824273898</setSpec>
        <setSpec>user-ucsy</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent.</dc:title>
          <dc:creator>Vaish, Abhishek</dc:creator>
          <dc:creator>Jha, Anand Sanjeev Kumar Atul Krishna</dc:creator>
          <dc:description>The main area of discussion of our paper “Security ofMobile Agent” is on the host platform attacking themobile agents. Malicious host is a system in networkwhich can take advantage of a mobile agent. Amalicious host can attack the agent and modify, stealcorrupting its code or state. It can deny services, returnfalse results or even terminate it completely. Providingsecurity against the host is difficult because the hostneeds to have the full information of the code and thestate in order to execute the agent. We haveimplemented a new strategy security mode to secure ourmobile agent such that its code is protected onchannel/host so that no malicious or third party canaccess it and the confidentiality may be preserved andultimately working on the problem of host attacking theagent. Our code is assembled in executable form at runtime so that execution platform cannot get enough timeto understand it. This technique is motivated fromobfuscation technique and tries to reduce the coherentproblem of trade off.</dc:description>
          <dc:date>2012-02-28</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000004726</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/4726</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
