-
2
-
-
84974577749
-
One-round secure computation and secure autonomous mobile agents
-
of LNCS. Springer-Verlag
-
C. Cachin, J. Camenisch, J. Kilian, and Joy Müller. One-round secure computation and secure autonomous mobile agents. In 27th International Colloquium on Automata, Languages and Programming (ICALP), volume 1853 of LNCS. Springer-Verlag, 2000.
-
(2000)
27th International Colloquium on Automata, Languages and Programming (ICALP)
, vol.1853
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Müller, J.4
-
4
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
The University of Auckland
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, The University of Auckland, 1997.
-
(1997)
Technical Report 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
5
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
of LNCS. Springer-Verlag
-
J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism. In 5th Information Security Conference (ISC 2002), volume 2433 of LNCS. Springer-Verlag, 2002.
-
(2002)
5th Information Security Conference (ISC 2002)
, vol.2433
-
-
Domingo-Ferrer, J.1
-
6
-
-
33745006829
-
Mobile agent watermarking and fingerprinting: Tracing malicious hosts
-
of LNCS. Springer-Verlag
-
O. Esparza, M. Fernandez, M. Soriano, J.L. Muñoz, and J. Forné. Mobile agent watermarking and fingerprinting: tracing malicious hosts. In Database and Expert Systems Applications (DEXA 2003), volume 2736 of LNCS. Springer-Verlag, 2003.
-
(2003)
Database and Expert Systems Applications (DEXA 2003)
, vol.2736
-
-
Esparza, O.1
Fernandez, M.2
Soriano, M.3
Muñoz, J.L.4
Forné, J.5
-
8
-
-
35248833019
-
Host revocation authority: A way of protecting mobile agents from malicious hosts
-
of LNCS. Springer-Verlag
-
O. Esparza, M. Soriano, J.L. Muñoz, and J. Forné. Host Revocation Authority: a Way of Protecting Mobile Agents from Malicious Hosts. In International Conference on Web Engineering (ICWE 2003), volume 2722 of LNCS. Springer-Verlag, 2003.
-
(2003)
International Conference on Web Engineering (ICWE 2003)
, vol.2722
-
-
Esparza, O.1
Soriano, M.2
Muñoz, J.L.3
Forné, J.4
-
9
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
of LNCS. Springer-Verlag
-
F. Hohl. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Hohl, F.1
-
11
-
-
18144414798
-
When agents roam, who can you trust?
-
Computing Science Research Center, Bell Labs
-
J. Ordille. When agents roam, who can you trust? Technical report, Computing Science Research Center, Bell Labs, 1996.
-
(1996)
Technical Report
-
-
Ordille, J.1
-
13
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
of LNCS. Springer-Verlag
-
T. Sander and C.F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Sander, T.1
Tschudin, C.F.2
-
14
-
-
0002717089
-
Cryptographic traces for mobile agents
-
of LNCS. Springer-Verlag
-
G. Vigna Cryptographic traces for mobile agents. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Vigna, G.1
|