Roth, V.V.Roth2022-03-092022-03-092002https://publica.fraunhofer.de/handle/publica/34126210.1007/3-540-36112-X_4Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straightforward way. Our aim is to demonstrate how cryptographic processing can be implemented transparently for agent programmers, thereby reducing the risks of human error in (secure) mobile agent programming.enmobile software agentmalicious hostattack mechanismcryptographyattack protection protocolcryptographic processingagent programmermobile agent programmingmobile agent security006400Empowering mobile software agentsconference paper