-
1
-
-
0035917655
-
Mobile agents: An introduction
-
G.P. Picco, "Mobile Agents: An Introduction," J. Microprocessors and Microsystems, vol. 25, no. 2, 2001, pp. 65-74.
-
(2001)
J. Microprocessors and Microsystems
, vol.25
, Issue.2
, pp. 65-74
-
-
Picco, G.P.1
-
2
-
-
4544373958
-
Understanding code mobility
-
A. Fuggetta, G.P. Picco, and O. Vigna, "Understanding Code Mobility," IEEE Trans. Software Eng., vol. 24. no. 5, 1998, pp. 342-361.
-
(1998)
IEEE Trans. Software Eng.
, vol.24
, Issue.5
, pp. 342-361
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, O.3
-
6
-
-
84982946701
-
A sanctuary for mobile agents
-
LNCS 1603, J. Vitek and C. Jensen, eds., Springer-Verlag
-
B. Yee, "A Sanctuary for Mobile Agents," Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, eds., LNCS 1603, Springer-Verlag, 1999, pp. 261-274.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 261-274
-
-
Yee, B.1
-
7
-
-
0002717089
-
Cryptographic traces for mobile agents
-
LNCS 1419, G. Vigna, ed., Springer-Verlag
-
G. Vigna, "Cryptographic Traces for Mobile Agents," Mobile Agents and Security, G. Vigna, ed., LNCS 1419, Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
-
-
Vigna, G.1
-
8
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
LNCS 2578, Springer-Verlag
-
Y. Chen et al., "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive," LNCS 2578, Information Hiding, Springer-Verlag, 2002, pp. 400-414.
-
(2002)
Information Hiding
, pp. 400-414
-
-
Chen, Y.1
-
9
-
-
0004196480
-
-
doctoral dissertation CMU-CS-94-149, Carnegie Mellon Univ., Pittsburgh
-
B. Yee, Using Secure Coprocessors, doctoral dissertation CMU-CS-94-149, Carnegie Mellon Univ., Pittsburgh, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
-
10
-
-
84867313902
-
Protecting the computation results of free-roaming agents
-
LNCS 1477, K. Rothermel and F. Hohl, eds., Springer-Verlag
-
G. Karjoth, N. Asokan, and C. Gülcü. "Protecting the Computation Results of Free-Roaming Agents," Proc. 2nd Int'l Workshop Mobile Agents (MA'98), LNCS 1477, K. Rothermel and F. Hohl, eds., Springer-Verlag, 1998, pp. 195-207.
-
(1998)
Proc. 2nd Int'l Workshop Mobile Agents (MA'98)
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
12
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
LNCS 1419, G. Vigna, ed., Springer-Verlag
-
T. Sander and C. Tschudin, "Protecting Mobile Agents Against Malicious Hosts." Mobile Agents and Security, LNCS 1419, G. Vigna, ed., Springer-Verlag, 1998, pp. 44-60.
-
(1998)
Mobile Agents and Security
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.2
-
14
-
-
0003700684
-
One-round secure computation and secure autonomous mobile agents
-
LNCS 1853, U. Montanari, J. Rolim, and E. Welzl, eds., Springer-Verlag
-
C. Cachin et al., "One-Round Secure Computation and Secure Autonomous Mobile Agents," Proc. 27th Int'l Colloquium on Automata, Languages, and Programming (ICALP'00), U. Montanari, J. Rolim, and E. Welzl, eds., LNCS 1853, Springer-Verlag, 2000.
-
(2000)
Proc. 27th Int'l Colloquium on Automata, Languages, and Programming (ICALP'00)
-
-
Cachin, C.1
-
15
-
-
0344087860
-
-
doctoral dissertation, ENST Paris/Institut Eurecom, Sophia Antipolis, France, Jan.
-
S. Loureiro, Mobile Code Protection, doctoral dissertation, ENST Paris/Institut Eurecom, Sophia Antipolis, France, Jan. 2001.
-
(2001)
Mobile Code Protection
-
-
Loureiro, S.1
|