메뉴 건너뛰기




Volumn 17, Issue 6, 2002, Pages 738-748

SPMH: A solution to the problem of malicious hosts

Author keywords

Computing with encrypted function; Mobile agent security; Reference states; The problem of malicious hosts

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); COMPUTER CRIME; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0036865870     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/BF02960764     Document Type: Article
Times cited : (3)

References (19)
  • 1
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Giovanni Vigna (ed.), Springer-Verlag
    • Fritz Hohl. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In Mobile Agents and Security, Giovanni Vigna (ed.), Springer-Verlag, 1998, pp.92-113. http://www.informatik.uni-stuttgard.de/ipvr/vs/projekte/mole/vignabuch.ps.gz
    • (1998) Mobile Agents and Security , pp. 92-113
    • Hohl, F.1
  • 3
    • 0342722189 scopus 로고    scopus 로고
    • Protecting mobile agents through tracing
    • Giovanni Vigna. Protecting mobile agents through tracing. In Mobile object systems ECOOP Workshop'97, 1997. http://arthur.cs.ucdavis.edu/~barnes/seminar/papers/vigna97.ps
    • Mobile Object Systems ECOOP Workshop'97, 1997
    • Vigna, G.1
  • 5
    • 80052017185 scopus 로고
    • Security-related comments regarding McEliece's public-key cryptosystem
    • Carl Pmerance (ed.), LNCS 293, Springer-Verlag
    • Carlisle M Adams, Henk Meijer. Security-related comments regarding McEliece's public-key cryptosystem. In Advances in Cryptology-CRYPTO'87, Carl Pmerance (ed.), LNCS 293, Springer-Verlag, 1988, pp.224-228.
    • (1988) Advances in Cryptology-CRYPTO'87 , pp. 224-228
    • Adams, C.M.1    Meijer, H.2
  • 6
    • 25344448159 scopus 로고
    • Algebraic coded cryptosystems
    • [Dissertation]. University of London-Royal Holloway and Bedford New College
    • Keith Gibson. Algebraic coded cryptosystems [Dissertation]. University of London-Royal Holloway and Bedford New College, 1995.
    • (1995)
    • Gibson, K.1
  • 8
    • 84905914152 scopus 로고    scopus 로고
    • POM-a mobile agent security model against malicious hosts
    • Guan Xudong, Yang Yiling et al. POM - A mobile agent security model against malicious hosts. In Proc. HPC-Asia 2000, Beijing, 2000, pp.1165-1166. http://202.120.7.27/member/~gxd/pom(hpcasia2000_2_pages).zip
    • Proc. HPC-Asia 2000, Beijing, 2000 , pp. 1165-1166
    • Xudong, G.1    Yiling, Y.2
  • 12
    • 4244010845 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • [Thesis]. The Chinese University of Hong Kong
    • Sau-Koon Ng. Protecting Mobile Agents Against Malicious Hosts [Thesis]. The Chinese University of Hong Kong, 2000. http://mole.informatik.uni-stuttgart.de/security/ngthesis.pdf
    • (2000)
    • Ng, S.-K.1
  • 13
    • 0008456957 scopus 로고    scopus 로고
    • A design of a protocol for detecting a mobile agent clone and its correctness proof using colored Petri nets
    • Technical Report: TR-DIC-CSL-1998-002, Kwang-Ju Institute of Science and Technology
    • Jusung Baek. A design of a protocol for detecting a mobile agent clone and its correctness proof using colored petri nets. Technical Report: TR-DIC-CSL-1998-002, Kwang-Ju Institute of Science and Technology, 1998. http://atom.kjist.ac.kr/~jsbaek/pub/tr-dic-1998-02.ps
    • (1998)
    • Baek, J.1
  • 16
    • 0012151785 scopus 로고    scopus 로고
    • A protocol to detect malicious hosts attacks by using reference states
    • Technical Report: TR-1999-09, Stuttgart University
    • Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report: TR-1999-09, Stuttgart University, 1999. ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/TR-1999-0 9/TR-1999-09.ps.gz
    • (1999)
    • Hohl, F.1
  • 17
    • 0003562406 scopus 로고    scopus 로고
    • A technical approach to privacy based on mobile agents protected by tamper-resistant hardware
    • [Dissertation]. Swiss Federal Institute of Technology in Lausanne
    • Uwe Georg Wilhelm. A technical approach to privacy based on mobile agents protected by tamper-resistant hardware [Dissertation]. Swiss Federal Institute of Technology in Lausanne, 1999. http://lsewww.epfl.ch/~wilhelm/Papers/thesis.pdf
    • (1999)
    • Wilhelm, U.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.