-
1
-
-
50249096618
-
-
ACM TOIT, February 2003
-
Claessens, J., Preneel, B., Vandewalle, J.: (How) can mobile agents do secure electronic transactions on untrusted hosts? - A survey of the security issues and current solutions (2003) ACM TOIT, February 2003.
-
(2003)
(How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? - A Survey of the Security Issues and Current Solutions
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
2
-
-
0003802912
-
An Approach to Solve the Problem of Malicious Hosts
-
Universität Stuttgart
-
Hohl, F.: An Approach to Solve the Problem of Malicious Hosts. Technical Report 1997/03, Universität Stuttgart (1997)
-
(1997)
Technical Report 1997/03
-
-
Hohl, F.1
-
4
-
-
0003954474
-
Mobile Agent Security
-
Technical Report, National Institute of Standards and Technology
-
Jansen, W., Karygiannis, T.: Mobile Agent Security. NIST Technical Report. Technical Report, National Institute of Standards and Technology (1999)
-
(1999)
NIST Technical Report
-
-
Jansen, W.1
Karygiannis, T.2
-
7
-
-
0002584180
-
Security for Mobile Agents: Issues and Requirements
-
Baltimore, MD, USA
-
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements (1996) Presented at the 1996 National Information Systems Security Conference, Baltimore, MD, USA. http://csrc.nist.gov/nissc/ 1996/papers/NISSC96/paper033/SWARUP96.PDF.
-
(1996)
1996 National Information Systems Security Conference
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
8
-
-
0001943763
-
Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
-
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. Lecture Notes in Computer Science 1419 (1998) 92-113
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
9
-
-
2642533128
-
Cryptographically Protected Objects
-
Ecole Polytechnique Federale de Lausanne, Switzerland
-
Uwe Wilhelm: Cryptographically Protected Objects. Technical report, Ecole Polytechnique Federale de Lausanne, Switzerland (1997)
-
(1997)
Technical Report
-
-
Wilhelm, U.1
-
10
-
-
84982994321
-
Introducing trusted third parties to the mobile agent paradigm
-
Vitek, J., Jensen, C., eds.: Springer-Verlag, New York, NY, USA
-
Wilhelm, U.G., Staamann, S., Buttyán, L.: Introducing trusted third parties to the mobile agent paradigm. In Vitek, J., Jensen, C., eds.: Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Volume 1603. Springer-Verlag, New York, NY, USA (1999) 471-491
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, vol.1603
, pp. 471-491
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyán, L.3
-
13
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Vigna, G., ed.: Mobile Agents and Security, Heidelberg, Germany, Springer-Verlag
-
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In Vigna, G., ed.: Mobile Agents and Security, LNCS, Heidelberg, Germany, Springer-Verlag (1998) 44-60
-
(1998)
LNCS
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
14
-
-
84982937984
-
Mutual Protection of Co-operating Agents
-
Roth, V.: Mutual Protection of Co-operating Agents. In: Secure Internet Programming. (1999) 275-285
-
(1999)
Secure Internet Programming
, pp. 275-285
-
-
Roth, V.1
-
17
-
-
26444439286
-
Clever Use of Trusted Third Parties for Mobile Agent Security
-
ICISA Press
-
Giansiracusa, M., Russell, S., Clark, A.: Clever Use of Trusted Third Parties for Mobile Agent Security. In: Applied Cryptography and Network Security - Technical Track, ICISA Press (2004) 398-407
-
(2004)
Applied Cryptography and Network Security - Technical Track
, pp. 398-407
-
-
Giansiracusa, M.1
Russell, S.2
Clark, A.3
-
18
-
-
84948143184
-
On the robustness of some cryptographic protocols for mobile agent protection
-
Roth, V.: On the robustness of some cryptographic protocols for mobile agent protection. Lecture Notes in Computer Science 2240 (2001) 1
-
(2001)
Lecture Notes in Computer Science
, vol.2240
, pp. 1
-
-
Roth, V.1
-
19
-
-
84944036447
-
Empowering mobile software agents
-
Roth, V.: Empowering mobile software agents. Lecture Notes in Computer Science 2535 (2002) 47-63
-
(2002)
Lecture Notes in Computer Science
, vol.2535
, pp. 47-63
-
-
Roth, V.1
-
21
-
-
26444552529
-
A Step Closer to a Secure Internet Mobile Agent Community
-
Giansiracusa, M., Russell, S., Clark, A., Hynd, J.: A Step Closer to a Secure Internet Mobile Agent Community (2004) Submitted to The Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004).
-
(2004)
Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004)
-
-
Giansiracusa, M.1
Russell, S.2
Clark, A.3
Hynd, J.4
-
22
-
-
0012151785
-
A Protocol to Detect Malicious Hosts Attacks by Using Reference States
-
Universität Stuttgart, Fakultät Informatik
-
Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical report, Universität Stuttgart, Fakultät Informatik (1999)
-
(1999)
Technical Report
-
-
Hohl, F.1
-
23
-
-
84949751564
-
Security for Mobile Agents: Authentication and State Appraisal
-
Rome, Italy
-
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Authentication and State Appraisal. In: Proceedings of the Fourth European Symposium on Research in Computer Security, Rome, Italy (1996) 118-130
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
24
-
-
35048852599
-
MASHIn Reputation Ratings as a Deterrent Against Poor Behaviour
-
Giansiracusa, M., Russell, S., Clark, A., Hynd, J.: MASHIn Reputation Ratings as a Deterrent Against Poor Behaviour (2004) To be submitted to The 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP 2004).
-
(2004)
3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP 2004)
-
-
Giansiracusa, M.1
Russell, S.2
Clark, A.3
Hynd, J.4
-
27
-
-
35048848014
-
Mobile agents on electronic markets opportunities, risks and agent protection
-
Klein, S., Gricar, J., Pucihar, A., eds.: Moderna Organizacija
-
Mandry, T., Pernul, G., Ro̊hm, A.W.: Mobile agents on electronic markets opportunities, risks and agent protection. In Klein, S., Gricar, J., Pucihar, A., eds.: 12th Bled Electronic Commerce Conference, Moderna Organizacija (1999)
-
(1999)
12th Bled Electronic Commerce Conference
-
-
Mandry, T.1
Pernul, G.2
Ro̊hm, A.W.3
-
28
-
-
85027559290
-
Cryptographic Security for Mobile Code
-
IEEE
-
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic Security for Mobile Code. In: Proc. IEEE Symposium on Security and Privacy, IEEE (2000)
-
(2000)
Proc. IEEE Symposium on Security and Privacy
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
|