메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2235-2239

Punishing manipulation attacks in mobile agent systems

Author keywords

Host revocation; Malicious host; Mobile agent; Security; Software watermarking

Indexed keywords

CODES (SYMBOLS); COPYRIGHTS; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL WATERMARKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 18144431695     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 4
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • The University of Auckland
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, The University of Auckland, 1997.
    • (1997) Technical Report 148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 5
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • of LNCS. Springer-Verlag
    • J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism. In 5th Information Security Conference (ISC 2002), volume 2433 of LNCS. Springer-Verlag, 2002.
    • (2002) 5th Information Security Conference (ISC 2002) , vol.2433
    • Domingo-Ferrer, J.1
  • 9
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • of LNCS. Springer-Verlag
    • F. Hohl. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security , vol.1419
    • Hohl, F.1
  • 11
    • 18144414798 scopus 로고    scopus 로고
    • When agents roam, who can you trust?
    • Computing Science Research Center, Bell Labs
    • J. Ordille. When agents roam, who can you trust? Technical report, Computing Science Research Center, Bell Labs, 1996.
    • (1996) Technical Report
    • Ordille, J.1
  • 13
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • of LNCS. Springer-Verlag
    • T. Sander and C.F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security , vol.1419
    • Sander, T.1    Tschudin, C.F.2
  • 14
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • of LNCS. Springer-Verlag
    • G. Vigna Cryptographic traces for mobile agents. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security , vol.1419
    • Vigna, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.