-
1
-
-
0002992633
-
D'Agents: Security in a multiple-language, mobile-agent system
-
Vigna G. (ed.), Berlin: Springer-Verlag
-
Gray, R.S., Cybenko, G., Kotz, D., et al. D'Agents: security in a multiple-language, mobile-agent system. In: Vigna, G., ed. Mobile Agents and Security. Lecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 154-187.
-
(1998)
Mobile Agents and Security. Lecture Notes in Computer Science 1419
, pp. 154-187
-
-
Gray, R.S.1
Cybenko, G.2
Kotz, D.3
-
2
-
-
0003906677
-
Mobile agents: Are they a good idea
-
Chess, D., Harrison, C., Kershenbaum, A. Mobile agents: are they a good idea? 1994. http://www.research.ibm.com/iagents/paps/mobile_idea.pdf.
-
(1994)
-
-
Chess, D.1
Harrison, C.2
Kershenbaum, A.3
-
3
-
-
0027836576
-
Efficient software-based fault isolation
-
Wahbe, R., Lucco, S., Anderson, T.E. et al. Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review, 1993, 27(5): 203-216.
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
-
4
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
Bertino E. (ed.), Lecture Notes in Computer Science
-
Farmer, W., Guttman, J., Swarup, V. Security for mobile agents: authentication and state appraisal. In: Bertino, E., ed. Proceedings of the Computer Security--ESORICS'96. Lecture Notes in Computer Science 1146, 1996. 118-130.
-
(1996)
Proceedings of the Computer Security--ESORICS'96. Lecture Notes in Computer Science
, pp. 118-130
-
-
Farmer, W.1
Guttman, J.2
Swarup, V.3
-
5
-
-
0001800257
-
Untrusted agents using proof-carrying code
-
Vigna G. (ed.), Berlin: Springer-Verlag
-
Necula, G.C., Safe, P.L. Untrusted agents using proof-carrying code. In: Vigna, G., ed. Mobile Agents and Security. Lecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 61-91.
-
(1998)
Mobile Agents and Security. Lecture Notes in Computer Science 1419
, pp. 61-91
-
-
Necula, G.C.1
Safe, P.L.2
-
6
-
-
54849411810
-
Secure recording of itineraries through cooperating agents
-
Roth, V. Secure recording of itineraries through cooperating agents. 1998. http://cuiwww.unige.ch/-ecoopws/ws98/papers/vroth98.ps.
-
(1998)
-
-
Roth, V.1
-
7
-
-
0034217132
-
Design and implementation of a mobile agent structured migration mechanism
-
Chinese source
-
Tao, Xian-Ping, Lu Jian, Zhang Guan-Quan, et al. Design and implementation of a mobile agent structured migration mechanism. Journal of Software, 2000, 11(7): 918-923 (in Chinese).
-
(2000)
Journal of Software
, vol.11
, Issue.7
, pp. 918-923
-
-
Tao, X.-P.1
Lu, J.2
Zhang, G.-Q.3
-
8
-
-
0034240088
-
Communications mechanism in Mogent system
-
Chinese source
-
Tao, Xian-Ping, Feng Xin-yu, Li, Xin, et al. Communications mechanism in mogent system. Journal of Software, 2000, 11(8): 1060-1065 (in Chinese).
-
(2000)
Journal of Software
, vol.11
, Issue.8
, pp. 1060-1065
-
-
Tao, X.-P.1
Feng, X.-Y.2
Li, X.3
-
10
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
Czajkowski, G., von Eicken, T. JRes: A resource accounting interface for Java. ACM SIGPLAN Notices, 1998, 33(10): 21-35.
-
(1998)
ACM SIGPLAN Notices
, vol.33
, Issue.10
, pp. 21-35
-
-
Czajkowski, G.1
von Eicken, T.2
-
11
-
-
84929273746
-
Untraceable electronic cash
-
Goldwasser S. (ed.), Berlin: Springer-Verlag
-
Chaum, D., Fiat, A., Naor, N. Untraceable electronic cash. In: Goldwasser, S., ed. Advances in Cryptology--CRYPTO'88. Lecture Notes in Computer Science 403, Berlin: Springer-Verlag, 1990. 319-327.
-
(1990)
Advances in Cryptology--CRYPTO'88. Lecture Notes in Computer Science 403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, N.3
-
12
-
-
0027719711
-
Netcash: A design for practical electronic currency on the Internet
-
Medvinsky, G., Neuman, B.C. Netcash: a design for practical electronic currency on the internet. In: ACM SIGSAC. 1993. 102-106.
-
(1993)
ACM SIGSAC
, pp. 102-106
-
-
Medvinsky, G.1
Neuman, B.C.2
-
13
-
-
0012041528
-
Public-key cryptography standards #12: Personal information exchange syntax standard
-
RSA Lanpratproes. Secirotu Inc.
-
RSA Laboratories, RSA Secuity Inc. Public-Key cryptography standards #12: personal information exchange syntax standard. 1997. http://www.rsasecurity.com/rsalabs/pkcs.
-
(1997)
Security Inc.
-
-
-
14
-
-
0003494726
-
Privacy enhancement for internet electronic mail: Part I-Part IV
-
RFC1421-RFC1424
-
Linn, J., et al. Privacy enhancement for internet electronic mail: Part I - Part IV. RFC1421-RFC1424, 1993.
-
(1993)
-
-
Linn, J.1
-
15
-
-
0012041163
-
Public-key cryptography standards #10: Certification request syntax standard
-
RSA Laboratories, RSA Security Inc.
-
RSA Laboratories, RSA Security Inc. Public-Key cryptography standards #10: certification request syntax standard. 1993. http://www.rsasecurity.com/rsalabs/pkcs.
-
(1993)
-
-
-
16
-
-
0012042822
-
Public-key cryptography standards #1: RSA encryption standard
-
RSA Laboratories, RSA Security Inc.
-
RSA Laboratories, RSA Security Inc. Public-Key cryptography standards #1: RSA encryption standard. 1993. http://www.rsasecurity.com/rsalabs/pkcs.
-
(1993)
-
-
-
17
-
-
0003602325
-
The MD5 message-digest algorithm
-
RFC 1321
-
Rivest, R.L. The MD5 message-digest algorithm. RFC 1321, 1992.
-
(1992)
-
-
Rivest, R.L.1
|