메뉴 건너뛰기




Volumn 3, Issue 1, 2003, Pages 28-48

(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions

Author keywords

Electronic transactions; Malicious hosts; Mobile agent security

Indexed keywords

ELECTRONIC PAYMENTS; ELECTRONIC TRANSACTIONS; MALICIOUS HOSTS; MOBILE AGENT SECURITY;

EID: 1142282727     PISSN: 15335399     EISSN: None     Source Type: Journal    
DOI: 10.1145/643477.643479     Document Type: Review
Times cited : (89)

References (78)
  • 3
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R. Anderson, Ed., Springer-Verlag, New York
    • AUCSMITH, D. 1996. Tamper resistant software: An implementation. In Proceedings of the Information Hiding Workshop '96, R. Anderson, Ed., Springer-Verlag, New York, 317-333.
    • (1996) Proceedings of the Information Hiding Workshop '96 , pp. 317-333
    • Aucsmith, D.1
  • 4
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • J. Kilian, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • BARAK, B., GOLDREICH, O., IMPAGLIAZZO, R., RUDICH, S., SAHAI, A., VADHAN, S., AND YANG, K. 2001. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, J. Kilian, Ed., Lecture Notes in Computer Science, vol. 2139, Springer-Verlag, New York, 1-18.
    • (2001) Advances in Cryptology - CRYPTO 2001 , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 5
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • M. Wiener, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • BELLARE, M. AND MINER, S. K. 1999. A forward-secure digital signature scheme. In Advances in Cryptology - CRYPTO'99, M. Wiener, Ed., Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, New York, 431-448.
    • (1999) Advances in Cryptology - CRYPTO'99 , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.K.2
  • 6
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • BELLOVIN, S. M. 1989. Security problems in the TCP/IP protocol suite. Comput. Commun. Rev. 19, 2 (April), 32-48.
    • (1989) Comput. Commun. Rev. , vol.19 , Issue.2 APRIL , pp. 32-48
    • Bellovin, S.M.1
  • 7
    • 0001636051 scopus 로고    scopus 로고
    • Authentication for mobile agents
    • G. Vigna, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
    • BERKOVITS, S., GUTTMAN, J. D., AND SWAEUP, V. 1998. Authentication for mobile agents. In Mobile Agents and Security, G. Vigna, Ed. Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 114-136.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 114-136
    • Berkovits, S.1    Guttman, J.D.2    Swaeup, V.3
  • 8
    • 84867304375 scopus 로고    scopus 로고
    • Ensuring the integrity of agent-based computations by short proofs
    • K. Rothermel and P. Hohl, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • BIEHL, I., MEYER, B., AND WETZEL, S. 1998. Ensuring the integrity of agent-based computations by short proofs. In Proceedings of the Second International Workshop on Mobile Agents, K. Rothermel and P. Hohl, Eds., Lecture Notes in Computer Science, vol. 1477, Springer-Verlag, New York, 183-194.
    • (1998) Proceedings of the Second International Workshop on Mobile Agents , vol.1477 , pp. 183-194
    • Biehl, I.1    Meyer, B.2    Wetzel, S.3
  • 9
  • 10
    • 0011232840 scopus 로고    scopus 로고
    • On mobile agent based transactions in moderately hostile environments
    • B. De Decker, P. Piessens, J. Smits, and E. Van Herreweghen, Eds., Kluwer Academic, Hingham, MA
    • BORSELIUS, N., MITCHELL, C. J., AND WILSON, A. 2001a. On mobile agent based transactions in moderately hostile environments. In Advances in Network and Distributed Systems Security - Proceedings of IFIP I-NetSec'01, B. De Decker, P. Piessens, J. Smits, and E. Van Herreweghen, Eds., Kluwer Academic, Hingham, MA, 173-186.
    • (2001) Advances in Network and Distributed Systems Security - Proceedings of IFIP I-NetSec'01 , pp. 173-186
    • Borselius, N.1    Mitchell, C.J.2    Wilson, A.3
  • 12
    • 84974577749 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • U. Montanari, J. D. P. Rolim, and E. Welzl, Eds., Lecture Notes in Computer Science. Springer-Verlag, New York
    • CACHIN, C., CAMENISCH, J., KILIAN, J., AND MÜLLER, J. 2000. One-round secure computation and secure autonomous mobile agents. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP), U. Montanari, J. D. P. Rolim, and E. Welzl, Eds., Lecture Notes in Computer Science, vol. 1853. Springer-Verlag, New York, 512-523.
    • (2000) Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP) , vol.1853 , pp. 512-523
    • Cachin, C.1    Camenisch, J.2    Kilian, J.3    Müller, J.4
  • 13
    • 0002380598 scopus 로고    scopus 로고
    • Security issues in mobile code systems
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • CHESS, D. M. 1998. Security issues in mobile code systems. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 1-14.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 1-14
    • Chess, D.M.1
  • 16
    • 3042854818 scopus 로고    scopus 로고
    • Secure communication for secure agent-based electronic commerce
    • J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • CLAESSENS, J., PRENEEL, B., AND VANDEWALLE, J. 2001. Secure communication for secure agent-based electronic commerce. In E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand, J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, vol. 2033, Springer-Verlag, New York, 180-190.
    • (2001) E-commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand , vol.2033 , pp. 180-190
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 17
    • 0012226644 scopus 로고    scopus 로고
    • Introduction to secure computation
    • I. Damgård, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • CRAMER, R. 1999. Introduction to secure computation. In Lectures on Data Security - Modern Cryptology in Theory and Practice, I. Damgård, Ed., Lecture Notes in Computer Science, vol. 1561, Springer-Verlag, New York, 16-62.
    • (1999) Lectures on Data Security - Modern Cryptology in Theory and Practice , vol.1561 , pp. 16-62
    • Cramer, R.1
  • 18
    • 84959064741 scopus 로고    scopus 로고
    • A secure payment protocol using mobile agents in an untrusted host environment
    • W. Kou, Y. Yesha, and C. J. Tan, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • DAS, A. AND GONGXUAN, Y. 2001. A secure payment protocol using mobile agents in an untrusted host environment. In Electronic Commerce Technologies - Proceedings of the Second International Symposium, ISEC 2001, W. Kou, Y. Yesha, and C. J. Tan, Eds., Lecture Notes in Computer Science, vol. 2040, Springer-Verlag, New York, 33-41.
    • (2001) Electronic Commerce Technologies - Proceedings of the Second International Symposium, ISEC 2001 , vol.2040 , pp. 33-41
    • Das, A.1    Gongxuan, Y.2
  • 19
    • 30944432557 scopus 로고    scopus 로고
    • Blinded-key signatures: Securing private keys embedded in mobile agents
    • Institute of Computing, University of Campinas, Brazil
    • DE CAHVALHO FERREIRA, L. AND DAHAB, R. 2001. Blinded-key signatures: Securing private keys embedded in mobile agents. Tech. Rep., Institute of Computing, University of Campinas, Brazil.
    • (2001) Tech. Rep.
    • De Cahvalho Ferreira, L.1    Dahab, R.2
  • 21
    • 0003286492 scopus 로고    scopus 로고
    • The TLS Protocol Version 1.0
    • IETF Request for Comments
    • DIERKS, T. AND ALLEN, C. 1999. The TLS Protocol Version 1.0. IETF Request for Comments, RFC 2246.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 24
    • 84949751564 scopus 로고    scopus 로고
    • Security for mobile agents: Authentication and state appraisal
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • FARMER, W. M., GUTTMAN, J. D., AND SWARUP, V. 1996b. Security for mobile agents: Authentication and state appraisal. In Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds., Lecture Notes in Computer Science, vol. 1146, Springer-Verlag, New York, 118-130.
    • (1996) Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS) , vol.1146 , pp. 118-130
    • Farmer, W.M.1    Guttman, J.D.2    Swarup, V.3
  • 26
    • 84957707067 scopus 로고    scopus 로고
    • Self-delegation with controlled propagation - Or - What if you lose your laptop
    • H. Krawczyk, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • GOLDREICH, O., PFITZMANN, B., AND RIVEST, R. L. 1998. Self-delegation with controlled propagation - or - What if you lose your laptop. In Advances in Cryptology - CRYPTO'98, H. Krawczyk, Ed., Lecture Notes in Computer Science, vol. 1462, Springer-Verlag, New York, 153-168.
    • (1998) Advances in Cryptology - CRYPTO'98 , vol.1462 , pp. 153-168
    • Goldreich, O.1    Pfitzmann, B.2    Rivest, R.L.3
  • 27
    • 0041720214 scopus 로고    scopus 로고
    • Signing, sealing, and guarding Java™ objects
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • GONG, L. AND SCHEMERS, R. 1998. Signing, sealing, and guarding Java™ objects. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 206-216.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 206-216
    • Gong, L.1    Schemers, R.2
  • 28
    • 0002992633 scopus 로고    scopus 로고
    • D'Agents: Security in a multiple-language, mobile-agent system
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • GRAY, R. S., KOTZ, D., CYBENKO, G., AND RUS, D. 1998. D'Agents: Security in a multiple-language, mobile-agent system. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 154-187.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 154-187
    • Gray, R.S.1    Kotz, D.2    Cybenko, G.3    Rus, D.4
  • 29
    • 3042858490 scopus 로고    scopus 로고
    • Mobile agent security
    • Computer Security Series. Artech House, Chapter 20
    • HASSLER, V. 2000. Mobile agent security. In Security Fundamentals for E-Commerce, Computer Security Series. Artech House, Chapter 20, 331-351.
    • (2000) Security Fundamentals for E-commerce , pp. 331-351
    • Hassler, V.1
  • 31
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • HOHL, F. 1998b. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 92-113.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 33
    • 84958045026 scopus 로고    scopus 로고
    • X-Cash: Executable digital cash
    • R. Hirschfeld, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • JAKOBSSON, M. AND JUELS, A. 1998. X-Cash: Executable digital cash. In Proceedings of Financial Cryptography '98, R. Hirschfeld, Ed., Lecture Notes in Computer Science, vol. 1465, Springer-Verlag, New York, 16-27.
    • (1998) Proceedings of Financial Cryptography '98 , vol.1465 , pp. 16-27
    • Jakobsson, M.1    Juels, A.2
  • 34
    • 0034315517 scopus 로고    scopus 로고
    • Countermeasures for mobile agent security
    • JANSEN, W. 2000. Countermeasures for mobile agent security. Comput. Commun. 23, 17 (Nov.), 1667-1676.
    • (2000) Comput. Commun. , vol.23 , Issue.17 NOV. , pp. 1667-1676
    • Jansen, W.1
  • 36
    • 84867313902 scopus 로고    scopus 로고
    • Protecting the computation results of free-roaming agents
    • K. Rothermel and F. Hohl, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • KARJOTH, G., ASOKAN, N., AND GÜLCÜ, C. 1998. Protecting the computation results of free-roaming agents. In Proceedings of the Second International Workshop on Mobile Agents, K. Rothermel and F. Hohl, Eds., Lecture Notes in Computer Science, vol. 1477, Springer-Verlag, New York, 195-207.
    • (1998) Proceedings of the Second International Workshop on Mobile Agents , vol.1477 , pp. 195-207
    • Karjoth, G.1    Asokan, N.2    Gülcü, C.3
  • 37
    • 3042776024 scopus 로고    scopus 로고
    • A security model for aglets
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • KARJOTH, G., LANGE, D. B., AND OSHIMA, M. 1998. A security model for aglets. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 188-205.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 188-205
    • Karjoth, G.1    Lange, D.B.2    Oshima, M.3
  • 39
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • KOCHER, P., JAFFE, J., AND JUN, B. 1999. Differential power analysis. In Advances in Cryptology-CRYPTO'99, M. Wiener, Ed., Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, New York, 388-397.
    • (1999) Advances in Cryptology-CRYPTO'99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 40
    • 0042785438 scopus 로고    scopus 로고
    • Mobile agents and the future of the Internet
    • KOTZ, D. AND GRAY, R. S. 1999. Mobile agents and the future of the Internet. ACM SIGOPS Oper. Syst. Rev. 33, 3 (July), 7-13.
    • (1999) ACM SIGOPS Oper. Syst. Rev. , vol.33 , Issue.3 JULY , pp. 7-13
    • Kotz, D.1    Gray, R.S.2
  • 41
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agents in hostile environments
    • B. Dawson, A. Clark, and C. Boyd, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • KOTZANIKOLAOU, P., BURMESTER, M., AND CHRISSIKOPOULOS, V. 2000. Secure transactions with mobile agents in hostile environments. In Proceedings of the fifth Australasian Conference on Information Security and Privacy, B. Dawson, A. Clark, and C. Boyd, Eds., Lecture Notes in Computer Science, vol. 1841, Springer-Verlag, New York, 289-297.
    • (2000) Proceedings of the Fifth Australasian Conference on Information Security and Privacy , vol.1841 , pp. 289-297
    • Kotzanikolaou, P.1    Burmester, M.2    Chrissikopoulos, V.3
  • 44
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • LANGE, D. B. AND OSHIMA, M. 1999. Seven good reasons for mobile agents. Commun. ACM 42, 3 (March), 88-89.
    • (1999) Commun. ACM , vol.42 , Issue.3 MARCH , pp. 88-89
    • Lange, D.B.1    Oshima, M.2
  • 45
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • V. Varadharajan and Y. Mu, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • LEE, B., KIM, H., AND KIM, K. 2001. Secure mobile agent using strong non-designated proxy signature. In Proceedings of the Sixth Australasian Conference on Information Security and Privacy (ACISP 2001), V. Varadharajan and Y. Mu, Eds., Lecture Notes in Computer Science, vol. 2119, Springer-Verlag, New York, 474-486.
    • (2001) Proceedings of the Sixth Australasian Conference on Information Security and Privacy (ACISP 2001) , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 53
    • 0001800257 scopus 로고    scopus 로고
    • Safe, untrusted agents using proof-carrying code
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • NECULA, G. C. AND LEE, P. 1998. Safe, untrusted agents using proof-carrying code. InMobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 61-91.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 61-91
    • Necula, G.C.1    Lee, P.2
  • 58
    • 4043174205 scopus 로고    scopus 로고
    • The safe-Tcl security model
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • OUSTERHOUT, J. K., LEVY, J. Y., AND WELCH, B. B. 1998. The safe-Tcl security model. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 217-234.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 217-234
    • Ousterhout, J.K.1    Levy, J.Y.2    Welch, B.B.3
  • 60
    • 0003249402 scopus 로고    scopus 로고
    • Environmental key generation towards clueless agents
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • RIORDAN, J. AND SCHNEIER, B. 1998. Environmental key generation towards clueless agents. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 15-24.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 15-24
    • Riordan, J.1    Schneier, B.2
  • 61
    • 2442581818 scopus 로고    scopus 로고
    • Proxy certificates: A mechanism for delegating digital signature power to mobile agents
    • Y. Ye and J. Liu, Eds.
    • ROMÃO, A. AND DA SILVA, M. M. 1999. Proxy certificates: A mechanism for delegating digital signature power to mobile agents. In Proceedings of the Workshop on Agents in Electronic Commerce, Y. Ye and J. Liu, Eds., 131-140.
    • (1999) Proceedings of the Workshop on Agents in Electronic Commerce , pp. 131-140
    • Romão, A.1    Da Silva, M.M.2
  • 62
    • 84948143184 scopus 로고    scopus 로고
    • On the robustness of some cryptographic protocols for mobile agent protection
    • G. P. Picco, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • ROTH, V. 2001. On the robustness of some cryptographic protocols for mobile agent protection. In Proceedings of the fifth International Conference on Mobile Agents, G. P. Picco, Ed., Lecture Notes in Computer Science, vol. 2240, Springer-Verlag, New York, 1-14.
    • (2001) Proceedings of the Fifth International Conference on Mobile Agents , vol.2240 , pp. 1-14
    • Roth, V.1
  • 63
    • 84957893114 scopus 로고    scopus 로고
    • On software protection via function hiding
    • D. Aucsmith, Ed., Lecture Notes in Computer Science. Springer-Verlag, New York
    • SANDER, T. AND TSCHUDIN, C. F. 1998a. On software protection via function hiding. In Proceedings of the Second International Workshop on Information Hiding, D. Aucsmith, Ed., Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, New York, 111-123.
    • (1998) Proceedings of the Second International Workshop on Information Hiding , vol.1525 , pp. 111-123
    • Sander, T.1    Tschudin, C.F.2
  • 64
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • SANDER, T. AND TSCHUDIN, C. F. 1998b. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 44-60.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 67
    • 84956866637 scopus 로고    scopus 로고
    • Playing "hide and seek" with stored keys
    • M. Franklin, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • SHAMIR, A. AND VAN SOMEREN, N. 1999. Playing "hide and seek" with stored keys. In Proceedings of Financial Cryptography '99, M. Franklin, Ed., Lecture Notes in Computer Science, vol. 1648, Springer-Verlag, New York, 118-124.
    • (1999) Proceedings of Financial Cryptography '99 , vol.1648 , pp. 118-124
    • Shamir, A.1    Van Someren, N.2
  • 68
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • B. Preneel, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • SHOUP, V. 2000. Practical threshold signatures. In Advances in Cryptology - EUROCRYPT 2000, B. Preneel, Ed., Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, New York, 207-220.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 69
    • 0003545819 scopus 로고
    • The Internet worm program: An analysis
    • SPAFFORD, E. H. 1988. The Internet worm program: An analysis. Purdue Tech. Rep. CSD-TR-823.
    • (1988) Purdue Tech. Rep. , vol.CSD-TR-823
    • Spafford, E.H.1
  • 70
    • 84862378459 scopus 로고    scopus 로고
    • TCPA. Trusted Computing Platform Alliance. Available at http://www.trustedpc.org/.
  • 73
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • VIGNA, G. 1998. Cryptographic traces for mobile agents. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 137-153.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 137-153
    • Vigna, G.1
  • 74
    • 0346166969 scopus 로고    scopus 로고
    • Language issues in mobile program security
    • G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • VOLPANO, D. AND SMITH, G. 1998. Language issues in mobile program security. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 25-43.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 25-43
    • Volpano, D.1    Smith, G.2
  • 76
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • J. Vitek and C. Jensen, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
    • YEE, B. S. 1999. A sanctuary for mobile agents. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds., Lecture Notes in Computer Science, vol. 1603, Springer-Verlag, New York, 261-274.
    • (1999) Secure Internet Programming: Security Issues for Mobile and Distributed Objects , vol.1603 , pp. 261-274
    • Yee, B.S.1
  • 77
    • 0033895668 scopus 로고    scopus 로고
    • Digital signature with one-time pair of keys
    • YI, X., SIEW, C. K., AND SYED, M. R. 2000. Digital signature with one-time pair of keys. Electron. Lett. 36, 2 (Jan.), 130-131.
    • (2000) Electron. Lett. , vol.36 , Issue.2 JAN. , pp. 130-131
    • Yi, X.1    Siew, C.K.2    Syed, M.R.3
  • 78
    • 84947927799 scopus 로고    scopus 로고
    • Sliding encryption: A cryptographic tool for mobile agents
    • E. Biham, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
    • YOUNG, A. AND YUNG, M. 1997. Sliding encryption: A cryptographic tool for mobile agents. In Fast Software Encryption - FSE'97, E. Biham, Ed., Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, New York, 230-241.
    • (1997) Fast Software Encryption - FSE'97 , vol.1267 , pp. 230-241
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.