메뉴 건너뛰기




Volumn 7, Issue 2, 2003, Pages 78-82

Protecting mobile code in the wild

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; ERROR CORRECTION; POLYNOMIALS;

EID: 0037362952     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2003.1189192     Document Type: Article
Times cited : (20)

References (15)
  • 1
    • 0035917655 scopus 로고    scopus 로고
    • Mobile agents: An introduction
    • G.P. Picco, "Mobile Agents: An Introduction," J. Microprocessors and Microsystems, vol. 25, no. 2, 2001, pp. 65-74.
    • (2001) J. Microprocessors and Microsystems , vol.25 , Issue.2 , pp. 65-74
    • Picco, G.P.1
  • 7
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • LNCS 1419, G. Vigna, ed., Springer-Verlag
    • G. Vigna, "Cryptographic Traces for Mobile Agents," Mobile Agents and Security, G. Vigna, ed., LNCS 1419, Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security
    • Vigna, G.1
  • 8
    • 35248822611 scopus 로고    scopus 로고
    • Oblivious hashing: A stealthy software integrity verification primitive
    • LNCS 2578, Springer-Verlag
    • Y. Chen et al., "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive," LNCS 2578, Information Hiding, Springer-Verlag, 2002, pp. 400-414.
    • (2002) Information Hiding , pp. 400-414
    • Chen, Y.1
  • 9
    • 0004196480 scopus 로고
    • doctoral dissertation CMU-CS-94-149, Carnegie Mellon Univ., Pittsburgh
    • B. Yee, Using Secure Coprocessors, doctoral dissertation CMU-CS-94-149, Carnegie Mellon Univ., Pittsburgh, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1
  • 10
    • 84867313902 scopus 로고    scopus 로고
    • Protecting the computation results of free-roaming agents
    • LNCS 1477, K. Rothermel and F. Hohl, eds., Springer-Verlag
    • G. Karjoth, N. Asokan, and C. Gülcü. "Protecting the Computation Results of Free-Roaming Agents," Proc. 2nd Int'l Workshop Mobile Agents (MA'98), LNCS 1477, K. Rothermel and F. Hohl, eds., Springer-Verlag, 1998, pp. 195-207.
    • (1998) Proc. 2nd Int'l Workshop Mobile Agents (MA'98) , pp. 195-207
    • Karjoth, G.1    Asokan, N.2    Gülcü, C.3
  • 12
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • LNCS 1419, G. Vigna, ed., Springer-Verlag
    • T. Sander and C. Tschudin, "Protecting Mobile Agents Against Malicious Hosts." Mobile Agents and Security, LNCS 1419, G. Vigna, ed., Springer-Verlag, 1998, pp. 44-60.
    • (1998) Mobile Agents and Security , pp. 44-60
    • Sander, T.1    Tschudin, C.2
  • 14
    • 0003700684 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • LNCS 1853, U. Montanari, J. Rolim, and E. Welzl, eds., Springer-Verlag
    • C. Cachin et al., "One-Round Secure Computation and Secure Autonomous Mobile Agents," Proc. 27th Int'l Colloquium on Automata, Languages, and Programming (ICALP'00), U. Montanari, J. Rolim, and E. Welzl, eds., LNCS 1853, Springer-Verlag, 2000.
    • (2000) Proc. 27th Int'l Colloquium on Automata, Languages, and Programming (ICALP'00)
    • Cachin, C.1
  • 15
    • 0344087860 scopus 로고    scopus 로고
    • doctoral dissertation, ENST Paris/Institut Eurecom, Sophia Antipolis, France, Jan.
    • S. Loureiro, Mobile Code Protection, doctoral dissertation, ENST Paris/Institut Eurecom, Sophia Antipolis, France, Jan. 2001.
    • (2001) Mobile Code Protection
    • Loureiro, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.