-
1
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Giovanni Vigna (ed.), Springer-Verlag
-
Fritz Hohl. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In Mobile Agents and Security, Giovanni Vigna (ed.), Springer-Verlag, 1998, pp.92-113. http://www.informatik.uni-stuttgard.de/ipvr/vs/projekte/mole/vignabuch.ps.gz
-
(1998)
Mobile Agents and Security
, pp. 92-113
-
-
Hohl, F.1
-
3
-
-
0342722189
-
Protecting mobile agents through tracing
-
Giovanni Vigna. Protecting mobile agents through tracing. In Mobile object systems ECOOP Workshop'97, 1997. http://arthur.cs.ucdavis.edu/~barnes/seminar/papers/vigna97.ps
-
Mobile Object Systems ECOOP Workshop'97, 1997
-
-
Vigna, G.1
-
5
-
-
80052017185
-
Security-related comments regarding McEliece's public-key cryptosystem
-
Carl Pmerance (ed.), LNCS 293, Springer-Verlag
-
Carlisle M Adams, Henk Meijer. Security-related comments regarding McEliece's public-key cryptosystem. In Advances in Cryptology-CRYPTO'87, Carl Pmerance (ed.), LNCS 293, Springer-Verlag, 1988, pp.224-228.
-
(1988)
Advances in Cryptology-CRYPTO'87
, pp. 224-228
-
-
Adams, C.M.1
Meijer, H.2
-
6
-
-
25344448159
-
Algebraic coded cryptosystems
-
[Dissertation]. University of London-Royal Holloway and Bedford New College
-
Keith Gibson. Algebraic coded cryptosystems [Dissertation]. University of London-Royal Holloway and Bedford New College, 1995.
-
(1995)
-
-
Gibson, K.1
-
8
-
-
84905914152
-
POM-a mobile agent security model against malicious hosts
-
Guan Xudong, Yang Yiling et al. POM - A mobile agent security model against malicious hosts. In Proc. HPC-Asia 2000, Beijing, 2000, pp.1165-1166. http://202.120.7.27/member/~gxd/pom(hpcasia2000_2_pages).zip
-
Proc. HPC-Asia 2000, Beijing, 2000
, pp. 1165-1166
-
-
Xudong, G.1
Yiling, Y.2
-
12
-
-
4244010845
-
Protecting mobile agents against malicious hosts
-
[Thesis]. The Chinese University of Hong Kong
-
Sau-Koon Ng. Protecting Mobile Agents Against Malicious Hosts [Thesis]. The Chinese University of Hong Kong, 2000. http://mole.informatik.uni-stuttgart.de/security/ngthesis.pdf
-
(2000)
-
-
Ng, S.-K.1
-
13
-
-
0008456957
-
A design of a protocol for detecting a mobile agent clone and its correctness proof using colored Petri nets
-
Technical Report: TR-DIC-CSL-1998-002, Kwang-Ju Institute of Science and Technology
-
Jusung Baek. A design of a protocol for detecting a mobile agent clone and its correctness proof using colored petri nets. Technical Report: TR-DIC-CSL-1998-002, Kwang-Ju Institute of Science and Technology, 1998. http://atom.kjist.ac.kr/~jsbaek/pub/tr-dic-1998-02.ps
-
(1998)
-
-
Baek, J.1
-
16
-
-
0012151785
-
A protocol to detect malicious hosts attacks by using reference states
-
Technical Report: TR-1999-09, Stuttgart University
-
Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report: TR-1999-09, Stuttgart University, 1999. ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/TR-1999-0 9/TR-1999-09.ps.gz
-
(1999)
-
-
Hohl, F.1
-
17
-
-
0003562406
-
A technical approach to privacy based on mobile agents protected by tamper-resistant hardware
-
[Dissertation]. Swiss Federal Institute of Technology in Lausanne
-
Uwe Georg Wilhelm. A technical approach to privacy based on mobile agents protected by tamper-resistant hardware [Dissertation]. Swiss Federal Institute of Technology in Lausanne, 1999. http://lsewww.epfl.ch/~wilhelm/Papers/thesis.pdf
-
(1999)
-
-
Wilhelm, U.G.1
|