메뉴 건너뛰기




Volumn 22, Issue 12, 1999, Pages 1165-1170

Security issues related to mobile code and agent-based systems

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA;

EID: 0032665338     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(99)00083-3     Document Type: Article
Times cited : (47)

References (20)
  • 5
    • 84976781807 scopus 로고
    • Reflections on Trusting Trust
    • Thompson K. Reflections on Trusting Trust. Communications of the ACM. 27:(8):1984;761-763.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 6
    • 0003547217 scopus 로고    scopus 로고
    • Sebastopol, CA: O'Reilly and Associates
    • Oaks S. Java Security. 1998;O'Reilly and Associates, Sebastopol, CA.
    • (1998) Java Security
    • Oaks, S.1
  • 8
    • 0001943763 scopus 로고    scopus 로고
    • Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
    • G. Vigna. Berlin: Springer-Verlag
    • Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. Vigna G. Mobile Agents and Security. Lecture Notes in Computer Science 1419. 1998;92-113 Springer-Verlag, Berlin.
    • (1998) Mobile Agents and Security. Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 9


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.