-
1
-
-
0034828870
-
Cryptographic security for mobile code
-
ALGESHEIMER, J., CACHIN, C., CAMENISCH, J., AND KARJOTH, G. 2001. Cryptographic security for mobile code. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), 2-11.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
2
-
-
0031354167
-
Server-supported signatures
-
ASOKAN, N., TSUDIK, G., AND WAIDNER, M. 1997. Server-supported signatures. J. Comput. Sec. 5, 1, 91-108.
-
(1997)
J. Comput. Sec.
, vol.5
, Issue.1
, pp. 91-108
-
-
Asokan, N.1
Tsudik, G.2
Waidner, M.3
-
3
-
-
84955621400
-
Tamper resistant software: An implementation
-
R. Anderson, Ed., Springer-Verlag, New York
-
AUCSMITH, D. 1996. Tamper resistant software: An implementation. In Proceedings of the Information Hiding Workshop '96, R. Anderson, Ed., Springer-Verlag, New York, 317-333.
-
(1996)
Proceedings of the Information Hiding Workshop '96
, pp. 317-333
-
-
Aucsmith, D.1
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
J. Kilian, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
BARAK, B., GOLDREICH, O., IMPAGLIAZZO, R., RUDICH, S., SAHAI, A., VADHAN, S., AND YANG, K. 2001. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, J. Kilian, Ed., Lecture Notes in Computer Science, vol. 2139, Springer-Verlag, New York, 1-18.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
79958074367
-
A forward-secure digital signature scheme
-
M. Wiener, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
BELLARE, M. AND MINER, S. K. 1999. A forward-secure digital signature scheme. In Advances in Cryptology - CRYPTO'99, M. Wiener, Ed., Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, New York, 431-448.
-
(1999)
Advances in Cryptology - CRYPTO'99
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.K.2
-
6
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
BELLOVIN, S. M. 1989. Security problems in the TCP/IP protocol suite. Comput. Commun. Rev. 19, 2 (April), 32-48.
-
(1989)
Comput. Commun. Rev.
, vol.19
, Issue.2 APRIL
, pp. 32-48
-
-
Bellovin, S.M.1
-
7
-
-
0001636051
-
Authentication for mobile agents
-
G. Vigna, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
-
BERKOVITS, S., GUTTMAN, J. D., AND SWAEUP, V. 1998. Authentication for mobile agents. In Mobile Agents and Security, G. Vigna, Ed. Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 114-136.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 114-136
-
-
Berkovits, S.1
Guttman, J.D.2
Swaeup, V.3
-
8
-
-
84867304375
-
Ensuring the integrity of agent-based computations by short proofs
-
K. Rothermel and P. Hohl, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
BIEHL, I., MEYER, B., AND WETZEL, S. 1998. Ensuring the integrity of agent-based computations by short proofs. In Proceedings of the Second International Workshop on Mobile Agents, K. Rothermel and P. Hohl, Eds., Lecture Notes in Computer Science, vol. 1477, Springer-Verlag, New York, 183-194.
-
(1998)
Proceedings of the Second International Workshop on Mobile Agents
, vol.1477
, pp. 183-194
-
-
Biehl, I.1
Meyer, B.2
Wetzel, S.3
-
9
-
-
3042854822
-
J-Seal2 - A secure high-performance mobile agent system
-
Y. Ye and J. Liu, Eds.
-
BINDER, W. 1999. J-Seal2 - A secure high-performance mobile agent system. In Proceedings of the Workshop on Agents in Electronic Commerce, Y. Ye and J. Liu, Eds., 141-150.
-
(1999)
Proceedings of the Workshop on Agents in Electronic Commerce
, pp. 141-150
-
-
Binder, W.1
-
10
-
-
0011232840
-
On mobile agent based transactions in moderately hostile environments
-
B. De Decker, P. Piessens, J. Smits, and E. Van Herreweghen, Eds., Kluwer Academic, Hingham, MA
-
BORSELIUS, N., MITCHELL, C. J., AND WILSON, A. 2001a. On mobile agent based transactions in moderately hostile environments. In Advances in Network and Distributed Systems Security - Proceedings of IFIP I-NetSec'01, B. De Decker, P. Piessens, J. Smits, and E. Van Herreweghen, Eds., Kluwer Academic, Hingham, MA, 173-186.
-
(2001)
Advances in Network and Distributed Systems Security - Proceedings of IFIP I-NetSec'01
, pp. 173-186
-
-
Borselius, N.1
Mitchell, C.J.2
Wilson, A.3
-
11
-
-
84873418553
-
Undetachable threshold signatures
-
B. Honary, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
BOHSELIUS, N., MITCHELL, C. J., AND WILSON, A. 2001b. Undetachable threshold signatures. In Proceedings of the Eighth IMA International Conference on Cryptography and Coding, B. Honary, Ed., Lecture Notes in Computer Science, vol. 2260, Springer-Verlag, New York, 239-244.
-
(2001)
Proceedings of the Eighth IMA International Conference on Cryptography and Coding
, vol.2260
, pp. 239-244
-
-
Bohselius, N.1
Mitchell, C.J.2
Wilson, A.3
-
12
-
-
84974577749
-
One-round secure computation and secure autonomous mobile agents
-
U. Montanari, J. D. P. Rolim, and E. Welzl, Eds., Lecture Notes in Computer Science. Springer-Verlag, New York
-
CACHIN, C., CAMENISCH, J., KILIAN, J., AND MÜLLER, J. 2000. One-round secure computation and secure autonomous mobile agents. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP), U. Montanari, J. D. P. Rolim, and E. Welzl, Eds., Lecture Notes in Computer Science, vol. 1853. Springer-Verlag, New York, 512-523.
-
(2000)
Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP)
, vol.1853
, pp. 512-523
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Müller, J.4
-
13
-
-
0002380598
-
Security issues in mobile code systems
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
CHESS, D. M. 1998. Security issues in mobile code systems. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 1-14.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 1-14
-
-
Chess, D.M.1
-
14
-
-
0004004188
-
Itinerant agents for mobile computing
-
CHESS, D. M., GROSOF, B., HARRISON, C. G., LEVINE, D., PARRIS, C., AND TSUDIK, G. 1995. Itinerant agents for mobile computing. IBM Res. Rep. RC 20010.
-
(1995)
IBM Res. Rep.
, vol.RC 20010
-
-
Chess, D.M.1
Grosof, B.2
Harrison, C.G.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
15
-
-
84955594169
-
Mobile agents: Are they a good idea?
-
J. Vitek and C. Tschudin, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
CHESS, D. M., HARRISON, C. G., AND KERSHENBAUM, A. 1997. Mobile agents: Are they a good idea? In Proceedings of the Second International Workshop on Mobile Object Systems: Towards the Programmable Internet, J. Vitek and C. Tschudin, Eds., Lecture Notes in Computer Science, vol. 1222, Springer-Verlag, New York, 25-45.
-
(1997)
Proceedings of the Second International Workshop on Mobile Object Systems: Towards the Programmable Internet
, vol.1222
, pp. 25-45
-
-
Chess, D.M.1
Harrison, C.G.2
Kershenbaum, A.3
-
16
-
-
3042854818
-
Secure communication for secure agent-based electronic commerce
-
J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
CLAESSENS, J., PRENEEL, B., AND VANDEWALLE, J. 2001. Secure communication for secure agent-based electronic commerce. In E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand, J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, vol. 2033, Springer-Verlag, New York, 180-190.
-
(2001)
E-commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand
, vol.2033
, pp. 180-190
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
17
-
-
0012226644
-
Introduction to secure computation
-
I. Damgård, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
CRAMER, R. 1999. Introduction to secure computation. In Lectures on Data Security - Modern Cryptology in Theory and Practice, I. Damgård, Ed., Lecture Notes in Computer Science, vol. 1561, Springer-Verlag, New York, 16-62.
-
(1999)
Lectures on Data Security - Modern Cryptology in Theory and Practice
, vol.1561
, pp. 16-62
-
-
Cramer, R.1
-
18
-
-
84959064741
-
A secure payment protocol using mobile agents in an untrusted host environment
-
W. Kou, Y. Yesha, and C. J. Tan, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
DAS, A. AND GONGXUAN, Y. 2001. A secure payment protocol using mobile agents in an untrusted host environment. In Electronic Commerce Technologies - Proceedings of the Second International Symposium, ISEC 2001, W. Kou, Y. Yesha, and C. J. Tan, Eds., Lecture Notes in Computer Science, vol. 2040, Springer-Verlag, New York, 33-41.
-
(2001)
Electronic Commerce Technologies - Proceedings of the Second International Symposium, ISEC 2001
, vol.2040
, pp. 33-41
-
-
Das, A.1
Gongxuan, Y.2
-
19
-
-
30944432557
-
Blinded-key signatures: Securing private keys embedded in mobile agents
-
Institute of Computing, University of Campinas, Brazil
-
DE CAHVALHO FERREIRA, L. AND DAHAB, R. 2001. Blinded-key signatures: Securing private keys embedded in mobile agents. Tech. Rep., Institute of Computing, University of Campinas, Brazil.
-
(2001)
Tech. Rep.
-
-
De Cahvalho Ferreira, L.1
Dahab, R.2
-
20
-
-
84937408341
-
Semi-trusted hosts and mobile agents: Enabling secure distributed computations
-
E. Horlait, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
DE DECKER, B., PIESSENS, F., VAN HOEYMISSEN, E., AND NEVEN, G. 2000. Semi-trusted hosts and mobile agents: Enabling secure distributed computations. In Proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications, E. Horlait, Ed., Lecture Notes in Computer Science, vol. 1931, Springer-Verlag, New York, 219-232.
-
(2000)
Proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications
, vol.1931
, pp. 219-232
-
-
De Decker, B.1
Piessens, F.2
Van Hoeymissen, E.3
Neven, G.4
-
21
-
-
0003286492
-
The TLS Protocol Version 1.0
-
IETF Request for Comments
-
DIERKS, T. AND ALLEN, C. 1999. The TLS Protocol Version 1.0. IETF Request for Comments, RFC 2246.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
22
-
-
0003406377
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
DORASWAMY, N. AND HARKINS, D. 1999. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice-Hall, Englewood Cliffs, NJ.
-
(1999)
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
-
-
Doraswamy, N.1
Harkins, D.2
-
24
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
FARMER, W. M., GUTTMAN, J. D., AND SWARUP, V. 1996b. Security for mobile agents: Authentication and state appraisal. In Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds., Lecture Notes in Computer Science, vol. 1146, Springer-Verlag, New York, 118-130.
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS)
, vol.1146
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
26
-
-
84957707067
-
Self-delegation with controlled propagation - Or - What if you lose your laptop
-
H. Krawczyk, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
GOLDREICH, O., PFITZMANN, B., AND RIVEST, R. L. 1998. Self-delegation with controlled propagation - or - What if you lose your laptop. In Advances in Cryptology - CRYPTO'98, H. Krawczyk, Ed., Lecture Notes in Computer Science, vol. 1462, Springer-Verlag, New York, 153-168.
-
(1998)
Advances in Cryptology - CRYPTO'98
, vol.1462
, pp. 153-168
-
-
Goldreich, O.1
Pfitzmann, B.2
Rivest, R.L.3
-
27
-
-
0041720214
-
Signing, sealing, and guarding Java™ objects
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
GONG, L. AND SCHEMERS, R. 1998. Signing, sealing, and guarding Java™ objects. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 206-216.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 206-216
-
-
Gong, L.1
Schemers, R.2
-
28
-
-
0002992633
-
D'Agents: Security in a multiple-language, mobile-agent system
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
GRAY, R. S., KOTZ, D., CYBENKO, G., AND RUS, D. 1998. D'Agents: Security in a multiple-language, mobile-agent system. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 154-187.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 154-187
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
29
-
-
3042858490
-
Mobile agent security
-
Computer Security Series. Artech House, Chapter 20
-
HASSLER, V. 2000. Mobile agent security. In Security Fundamentals for E-Commerce, Computer Security Series. Artech House, Chapter 20, 331-351.
-
(2000)
Security Fundamentals for E-commerce
, pp. 331-351
-
-
Hassler, V.1
-
31
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
HOHL, F. 1998b. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 92-113.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
33
-
-
84958045026
-
X-Cash: Executable digital cash
-
R. Hirschfeld, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
JAKOBSSON, M. AND JUELS, A. 1998. X-Cash: Executable digital cash. In Proceedings of Financial Cryptography '98, R. Hirschfeld, Ed., Lecture Notes in Computer Science, vol. 1465, Springer-Verlag, New York, 16-27.
-
(1998)
Proceedings of Financial Cryptography '98
, vol.1465
, pp. 16-27
-
-
Jakobsson, M.1
Juels, A.2
-
34
-
-
0034315517
-
Countermeasures for mobile agent security
-
JANSEN, W. 2000. Countermeasures for mobile agent security. Comput. Commun. 23, 17 (Nov.), 1667-1676.
-
(2000)
Comput. Commun.
, vol.23
, Issue.17 NOV.
, pp. 1667-1676
-
-
Jansen, W.1
-
36
-
-
84867313902
-
Protecting the computation results of free-roaming agents
-
K. Rothermel and F. Hohl, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
KARJOTH, G., ASOKAN, N., AND GÜLCÜ, C. 1998. Protecting the computation results of free-roaming agents. In Proceedings of the Second International Workshop on Mobile Agents, K. Rothermel and F. Hohl, Eds., Lecture Notes in Computer Science, vol. 1477, Springer-Verlag, New York, 195-207.
-
(1998)
Proceedings of the Second International Workshop on Mobile Agents
, vol.1477
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
37
-
-
3042776024
-
A security model for aglets
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
KARJOTH, G., LANGE, D. B., AND OSHIMA, M. 1998. A security model for aglets. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 188-205.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 188-205
-
-
Karjoth, G.1
Lange, D.B.2
Oshima, M.3
-
38
-
-
3042688872
-
Secret computation with secrets for mobile agent using one-time proxy signature
-
KIM, H., BAEK, J., LEE, B., AND KIM, K. 2001. Secret computation with secrets for mobile agent using one-time proxy signature. In Proceedings of the 2001 Symposium on Cryptography and Information Security, 845-850.
-
(2001)
Proceedings of the 2001 Symposium on Cryptography and Information Security
, pp. 845-850
-
-
Kim, H.1
Baek, J.2
Lee, B.3
Kim, K.4
-
39
-
-
84939573910
-
Differential power analysis
-
M. Wiener, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
KOCHER, P., JAFFE, J., AND JUN, B. 1999. Differential power analysis. In Advances in Cryptology-CRYPTO'99, M. Wiener, Ed., Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, New York, 388-397.
-
(1999)
Advances in Cryptology-CRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
40
-
-
0042785438
-
Mobile agents and the future of the Internet
-
KOTZ, D. AND GRAY, R. S. 1999. Mobile agents and the future of the Internet. ACM SIGOPS Oper. Syst. Rev. 33, 3 (July), 7-13.
-
(1999)
ACM SIGOPS Oper. Syst. Rev.
, vol.33
, Issue.3 JULY
, pp. 7-13
-
-
Kotz, D.1
Gray, R.S.2
-
41
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
B. Dawson, A. Clark, and C. Boyd, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
KOTZANIKOLAOU, P., BURMESTER, M., AND CHRISSIKOPOULOS, V. 2000. Secure transactions with mobile agents in hostile environments. In Proceedings of the fifth Australasian Conference on Information Security and Privacy, B. Dawson, A. Clark, and C. Boyd, Eds., Lecture Notes in Computer Science, vol. 1841, Springer-Verlag, New York, 289-297.
-
(2000)
Proceedings of the Fifth Australasian Conference on Information Security and Privacy
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
42
-
-
0003389059
-
Mobile agents for secure electronic transactions
-
N. Mastorakis, Ed., World Scientific, River Edge, NJ
-
KOTZANIKOLAOU, P., KATSIRELOS, G., AND CHRISSIKOPOULOS, V. 1999. Mobile agents for secure electronic transactions. In Recent Advances in Signal Processing and Communications, N. Mastorakis, Ed., World Scientific, River Edge, NJ, 363-368.
-
(1999)
Recent Advances in Signal Processing and Communications
, pp. 363-368
-
-
Kotzanikolaou, P.1
Katsirelos, G.2
Chrissikopoulos, V.3
-
44
-
-
85014167243
-
Seven good reasons for mobile agents
-
LANGE, D. B. AND OSHIMA, M. 1999. Seven good reasons for mobile agents. Commun. ACM 42, 3 (March), 88-89.
-
(1999)
Commun. ACM
, vol.42
, Issue.3 MARCH
, pp. 88-89
-
-
Lange, D.B.1
Oshima, M.2
-
45
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
V. Varadharajan and Y. Mu, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
LEE, B., KIM, H., AND KIM, K. 2001. Secure mobile agent using strong non-designated proxy signature. In Proceedings of the Sixth Australasian Conference on Information Security and Privacy (ACISP 2001), V. Varadharajan and Y. Mu, Eds., Lecture Notes in Computer Science, vol. 2119, Springer-Verlag, New York, 474-486.
-
(2001)
Proceedings of the Sixth Australasian Conference on Information Security and Privacy (ACISP 2001)
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
47
-
-
1642279400
-
Function hiding based on error correcting codes
-
(Hong Kong), M. Blum and C. Lee, Eds.
-
LOUREIRO, S. AND MOLVA, R. 1999. Function hiding based on error correcting codes. In Proceedings of the CryptTEC'99 International Workshop on Cryptographic Techniques and Electronic Commerce (Hong Kong), M. Blum and C. Lee, Eds., 92-98.
-
(1999)
Proceedings of the CryptTEC'99 International Workshop on Cryptographic Techniques and Electronic Commerce
, pp. 92-98
-
-
Loureiro, S.1
Molva, R.2
-
49
-
-
0008969812
-
Secure data collection with updates
-
Y. Ye and J. Liu, Eds.
-
LOUREIRO, S., MOLVA, R., AND PANNETRAT, A. 1999. Secure data collection with updates. In Proceedings of the Workshop on Agents in Electronic Commerce, Y. Ye and J. Liu, Eds., 121-130.
-
(1999)
Proceedings of the Workshop on Agents in Electronic Commerce
, pp. 121-130
-
-
Loureiro, S.1
Molva, R.2
Pannetrat, A.3
-
51
-
-
79955913239
-
On the security of server-aided RSA protocols
-
H. Imai and Y. Zheng, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
MERKLE, J. AND WERCHNER, R. 1998. On the security of server-aided RSA protocols. In Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, H. Imai and Y. Zheng, Eds., Lecture Notes in Computer Science, vol. 1431, Springer-Verlag, New York, 99-116.
-
(1998)
Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography
, vol.1431
, pp. 99-116
-
-
Merkle, J.1
Werchner, R.2
-
52
-
-
85015667755
-
Cryptographic support for fault-tolerant distributed computing
-
MINSKY, Y., VAN RENESSE, R., SCHNEIDER, F. B., AND STOLLER, S. D. 1996. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the Seventh ACM SIGOPS European Workshop, 109-114.
-
(1996)
Proceedings of the Seventh ACM SIGOPS European Workshop
, pp. 109-114
-
-
Minsky, Y.1
Van Renesse, R.2
Schneider, F.B.3
Stoller, S.D.4
-
53
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
NECULA, G. C. AND LEE, P. 1998. Safe, untrusted agents using proof-carrying code. InMobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 61-91.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
55
-
-
3042815471
-
On the practical feasibility of secure distributed computing: A case study
-
S. Qing and J. Eloff, Eds., Kluwer Academic, Hingham, MA
-
NEVEN, G., PIESSENS, F., AND DE DECKER, B. 2000. On the practical feasibility of secure distributed computing: A case study. In Information Security for Global Information Infrastructures - Proceedings of IFIP SEC 2000, S. Qing and J. Eloff, Eds., Kluwer Academic, Hingham, MA, 361-370.
-
(2000)
Information Security for Global Information Infrastructures - Proceedings of IFIP SEC 2000
, pp. 361-370
-
-
Neven, G.1
Piessens, F.2
De Decker, B.3
-
56
-
-
3042730470
-
Intention spreading: An extensible theme to protect mobile agents from read attack hoisted by malicious hosts
-
J. Liu and N. Zhong, Eds., World Scientific, River Edge, NJ
-
Ng, S.-K. AND CHEUNG, K.-W. 1999. Intention spreading: An extensible theme to protect mobile agents from read attack hoisted by malicious hosts. In Intelligent Agent Technology: Systems, Methodologies, and Tools - Proceedings of the first Asia-Pacific Conference on Intelligent Agent Technology (IAT '99), J. Liu and N. Zhong, Eds., World Scientific, River Edge, NJ, 406-415.
-
(1999)
Intelligent Agent Technology: Systems, Methodologies, and Tools - Proceedings of the First Asia-pacific Conference on Intelligent Agent Technology (IAT '99)
, pp. 406-415
-
-
Ng, S.-K.1
Cheung, K.-W.2
-
57
-
-
0003734056
-
-
Artech House
-
O'MAHONY, D., PEIRCE, M., AND TEWARI, H. 2001. Electronic Payment Systems for E-Commerce, 2nd ed. Artech House.
-
(2001)
Electronic Payment Systems for E-Commerce, 2nd Ed.
-
-
O'Mahony, D.1
Peirce, M.2
Tewari, H.3
-
58
-
-
4043174205
-
The safe-Tcl security model
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
OUSTERHOUT, J. K., LEVY, J. Y., AND WELCH, B. B. 1998. The safe-Tcl security model. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 217-234.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 217-234
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
60
-
-
0003249402
-
Environmental key generation towards clueless agents
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
RIORDAN, J. AND SCHNEIER, B. 1998. Environmental key generation towards clueless agents. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 15-24.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 15-24
-
-
Riordan, J.1
Schneier, B.2
-
61
-
-
2442581818
-
Proxy certificates: A mechanism for delegating digital signature power to mobile agents
-
Y. Ye and J. Liu, Eds.
-
ROMÃO, A. AND DA SILVA, M. M. 1999. Proxy certificates: A mechanism for delegating digital signature power to mobile agents. In Proceedings of the Workshop on Agents in Electronic Commerce, Y. Ye and J. Liu, Eds., 131-140.
-
(1999)
Proceedings of the Workshop on Agents in Electronic Commerce
, pp. 131-140
-
-
Romão, A.1
Da Silva, M.M.2
-
62
-
-
84948143184
-
On the robustness of some cryptographic protocols for mobile agent protection
-
G. P. Picco, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
ROTH, V. 2001. On the robustness of some cryptographic protocols for mobile agent protection. In Proceedings of the fifth International Conference on Mobile Agents, G. P. Picco, Ed., Lecture Notes in Computer Science, vol. 2240, Springer-Verlag, New York, 1-14.
-
(2001)
Proceedings of the Fifth International Conference on Mobile Agents
, vol.2240
, pp. 1-14
-
-
Roth, V.1
-
63
-
-
84957893114
-
On software protection via function hiding
-
D. Aucsmith, Ed., Lecture Notes in Computer Science. Springer-Verlag, New York
-
SANDER, T. AND TSCHUDIN, C. F. 1998a. On software protection via function hiding. In Proceedings of the Second International Workshop on Information Hiding, D. Aucsmith, Ed., Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, New York, 111-123.
-
(1998)
Proceedings of the Second International Workshop on Information Hiding
, vol.1525
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.F.2
-
64
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
SANDER, T. AND TSCHUDIN, C. F. 1998b. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 44-60.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
67
-
-
84956866637
-
Playing "hide and seek" with stored keys
-
M. Franklin, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
SHAMIR, A. AND VAN SOMEREN, N. 1999. Playing "hide and seek" with stored keys. In Proceedings of Financial Cryptography '99, M. Franklin, Ed., Lecture Notes in Computer Science, vol. 1648, Springer-Verlag, New York, 118-124.
-
(1999)
Proceedings of Financial Cryptography '99
, vol.1648
, pp. 118-124
-
-
Shamir, A.1
Van Someren, N.2
-
68
-
-
84948954277
-
Practical threshold signatures
-
B. Preneel, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
SHOUP, V. 2000. Practical threshold signatures. In Advances in Cryptology - EUROCRYPT 2000, B. Preneel, Ed., Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, New York, 207-220.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
69
-
-
0003545819
-
The Internet worm program: An analysis
-
SPAFFORD, E. H. 1988. The Internet worm program: An analysis. Purdue Tech. Rep. CSD-TR-823.
-
(1988)
Purdue Tech. Rep.
, vol.CSD-TR-823
-
-
Spafford, E.H.1
-
70
-
-
84862378459
-
-
TCPA. Trusted Computing Platform Alliance. Available at http://www.trustedpc.org/.
-
-
-
-
71
-
-
0002121661
-
Mobile Agent Security
-
M. Klusch, Ed., Springer-Verlag, New York, Chapter 18
-
TSCHUDIN, C. F. 1999. Mobile Agent Security. In Intelligent Information Agents: Agent-Based Information Discovery and Management on the Internet, M. Klusch, Ed., Springer-Verlag, New York, Chapter 18, 431-146.
-
(1999)
Intelligent Information Agents: Agent-based Information Discovery and Management on the Internet
, pp. 431-1146
-
-
Tschudin, C.F.1
-
73
-
-
0002717089
-
Cryptographic traces for mobile agents
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
VIGNA, G. 1998. Cryptographic traces for mobile agents. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 137-153.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 137-153
-
-
Vigna, G.1
-
74
-
-
0346166969
-
Language issues in mobile program security
-
G. Vigna, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
VOLPANO, D. AND SMITH, G. 1998. Language issues in mobile program security. In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 25-43.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 25-43
-
-
Volpano, D.1
Smith, G.2
-
76
-
-
84982946701
-
A sanctuary for mobile agents
-
J. Vitek and C. Jensen, Eds., Lecture Notes in Computer Science, Springer-Verlag, New York
-
YEE, B. S. 1999. A sanctuary for mobile agents. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds., Lecture Notes in Computer Science, vol. 1603, Springer-Verlag, New York, 261-274.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, vol.1603
, pp. 261-274
-
-
Yee, B.S.1
-
77
-
-
0033895668
-
Digital signature with one-time pair of keys
-
YI, X., SIEW, C. K., AND SYED, M. R. 2000. Digital signature with one-time pair of keys. Electron. Lett. 36, 2 (Jan.), 130-131.
-
(2000)
Electron. Lett.
, vol.36
, Issue.2 JAN.
, pp. 130-131
-
-
Yi, X.1
Siew, C.K.2
Syed, M.R.3
-
78
-
-
84947927799
-
Sliding encryption: A cryptographic tool for mobile agents
-
E. Biham, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
YOUNG, A. AND YUNG, M. 1997. Sliding encryption: A cryptographic tool for mobile agents. In Fast Software Encryption - FSE'97, E. Biham, Ed., Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, New York, 230-241.
-
(1997)
Fast Software Encryption - FSE'97
, vol.1267
, pp. 230-241
-
-
Young, A.1
Yung, M.2
|