-
1
-
-
84948986458
-
Optimal asymmetric encryption
-
Lecture Notes in Computer Science, Springer Verlag
-
Mihir Bellare and Phillip Rogaway, "Optimal asymmetric encryption," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol.950, Springer Verlag, pp.92-111, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Lecture Notes in Computer Science, Springer Verlag
-
Emmanuel Bresson, Jacques Stern, and Michael Szydlo, "Threshold ring signatures and applications to ad-hoc groups," Advances in Cryptalogy -CRYPTO 2002, Lecture Notes in Computer Science, Vol.2442, Springer Verlag, pp.465-480, 2002.
-
(2002)
Advances in Cryptalogy -CRYPTO 2002
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
4
-
-
84957354154
-
Efficient and generalized group signatures
-
Lecture Notes in Computer Science, Springer Verlag
-
Jan Camenisch, "Efficient and generalized group signatures," Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, Vol.1233, Springer Verlag, pp.465-479, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
5
-
-
85024290278
-
Group signature
-
Lecture Notes in Computer Science, Springer Verlag
-
David Chaum and Eugéne Van Heyst, "Group signature," Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, Vol.547, Springer Verlag, pp.257-265, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '91
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
6
-
-
84944079908
-
Defenses against the truncation of computation results of free-roaming agents
-
Lecture Notes in Computer Science, Springer Verlag
-
Jeff S.L. Cheng and Victor K. Wei, "Defenses against the truncation of computation results of free-roaming agents," Information and Communication Security: 4th International Conference, ICICS 2002, Lecture Notes in Computer Science, Vol.2513, Springer Verlag, pp.1-12, 2002.
-
(2002)
Information and Communication Security: 4th International Conference, ICICS 2002
, vol.2513
, pp. 1-12
-
-
Cheng, J.S.L.1
Wei, V.K.2
-
7
-
-
84927752554
-
Design verifier proofs and their applications
-
Lecture Notes in Computer Science, Springer Verlag
-
Markus Jakobsson, Kazue Sake, and Russel Impagliazzo, "Design verifier proofs and their applications," Advances in Cryptology - EUROCRYPT '96, Lecture Notes in Computer Science, Vol.1070, Springer Verlag, pp.143-154, 1996.
-
(1996)
Advances in Cryptology - EUROCRYPT '96
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sake, K.2
Impagliazzo, R.3
-
9
-
-
84944880876
-
Secure mobile agent-based merchant brokering in distributed marketplaces
-
Lecture Notes in Computer Science, Springer Verlag
-
Günter Karjoth, "Secure mobile agent-based merchant brokering in distributed marketplaces," Joint Symposium on Agent Systems and Applications / Mobile Agents, ASA/MA 2000, Lecture Notes in Computer Science, Vol.1882, Springer Verlag, pp.44-56, 2000.
-
(2000)
Joint Symposium on Agent Systems and Applications / Mobile Agents, ASA/MA 2000
, vol.1882
, pp. 44-56
-
-
Karjoth, G.1
-
10
-
-
84867313902
-
Protecting the computation results of free-roaming agents
-
Lecture Notes in Computer Science, Springer Verlag
-
Günter Karjoth, N. Asokan, and Ceki Gülcü, "Protecting the computation results of free-roaming agents," Mobile Agents: Second International Workshop, MA '98, Lecture Notes in Computer Science, Vol. 1477, Springer Verlag, pp.195-207, 1998.
-
(1998)
Mobile Agents: Second International Workshop, MA '98
, vol.1477
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
11
-
-
0035836592
-
Security in the Ajanta mobile agent system
-
John Wiley & Sons
-
Neeran Karnik and Anand Tripathi, "Security in the Ajanta mobile agent system," Software - Practice and Experience, Vol.31, No.4, John Wiley & Sons, 2001.
-
(2001)
Software - Practice and Experience
, vol.31
, Issue.4
-
-
Karnik, N.1
Tripathi, A.2
-
12
-
-
2942673574
-
Secure data collection with updates
-
Sergio Loureiro, Refik Molva, and Alain Pannetrat, "Secure data collection with updates," Electronic Commerence Research Journal, Vol.1, No. 1/2, pp. 119-130, 2001.
-
(2001)
Electronic Commerence Research Journal
, vol.1
, Issue.1-2
, pp. 119-130
-
-
Loureiro, S.1
Molva, R.2
Pannetrat, A.3
-
13
-
-
1142304655
-
A configurable mobile agent data protection protocol
-
ACM
-
Paolo Maggi and Riccardo Sisto, "A configurable mobile agent data protection protocol," Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '03, ACM, pp.851-858, 2003.
-
(2003)
Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '03
, pp. 851-858
-
-
Maggi, P.1
Sisto, R.2
-
14
-
-
84964031610
-
Data protection in mobile agents; one-time key based approach
-
IEEE
-
Jong-Youl Park, Dong-Ik Lee, and Hyung-Hyo Lee, "Data protection in mobile agents; one-time key based approach," Fifth International Symposium on Autonomous Decentralized Systems, IEEE, pp.411-418, 2001.
-
(2001)
Fifth International Symposium on Autonomous Decentralized Systems
, pp. 411-418
-
-
Park, J.-Y.1
Lee, D.-I.2
Lee, H.-H.3
-
15
-
-
84946833891
-
How to leak a secret
-
Lecture Notes in Computer Science, Springer Verlag
-
Ronald L. Rivest, Adi. Shamir, and Yael. Tauman "How to leak a secret," Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, Vol.2248, Springer Verlag, pp.552-565, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
16
-
-
84948143184
-
On the robustness of some cryptographic protocols for mobile agent protection
-
Lecture Notes in Computer Science, Springer Verlag
-
Volker Roth, "On the robustness of some cryptographic protocols for mobile agent protection," Mobile Agents: 5th International Conference, MA 2001, Lecture Notes in Computer Science, Vol.2240, Springer Verlag, pp.1-14, 2001.
-
(2001)
Mobile Agents: 5th International Conference, MA 2001
, vol.2240
, pp. 1-14
-
-
Roth, V.1
-
19
-
-
84982946701
-
A sanctuary for mobile agents
-
Bennet S. Yee, "A sanctuary for mobile agents," Secure Internet Programming, pp.261-273, 1999.
-
(1999)
Secure Internet Programming
, pp. 261-273
-
-
Yee, B.S.1
|