-
1
-
-
33746162738
-
-
IST SIMPLICITY Project: .
-
-
-
-
2
-
-
33746106424
-
-
IST UBISEC Project: .
-
-
-
-
3
-
-
33746124169
-
-
ITU-T SG16: .
-
-
-
-
4
-
-
0002380598
-
Security issues in mobile code systems
-
Mobile Agents and Security, Springer-Verlag, Berlin
-
Chess D. Security issues in mobile code systems. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
-
(1998)
LNCS
, vol.1419
-
-
Chess, D.1
-
5
-
-
33746123380
-
-
D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, G. Tsudik, Itinerant agents for mobile computing, in: Readings in Agents, 1997.
-
-
-
-
6
-
-
33746111436
-
-
D. Chess, C. Harrison, A. Kershenbaum, Mobile agents: are they a good idea, IBM Research Report, 1995.
-
-
-
-
7
-
-
28844456618
-
Graph theoretic software watermarks: implementation, analysis, and attacks
-
6th International Workshop on Information Hiding, Springer-Verlag, Berlin
-
Collberg C., Huntwork A., Carter E., and Townsend G. Graph theoretic software watermarks: implementation, analysis, and attacks. 6th International Workshop on Information Hiding. LNCS vol. 3200 (2004), Springer-Verlag, Berlin
-
(2004)
LNCS
, vol.3200
-
-
Collberg, C.1
Huntwork, A.2
Carter, E.3
Townsend, G.4
-
8
-
-
0032691819
-
-
C. Collberg, C. Thomborson, Software watermarking: models and dynamic embeddings, in: Principles of Programming Languages 1999, POPL'99, 1999.
-
-
-
-
9
-
-
33746175687
-
-
C. Collberg, C. Thomborson, D. Low, A taxonomy of obfuscating transformations, Technical Report 148, The University of Auckland, 1997.
-
-
-
-
10
-
-
35248833019
-
Host revocation authority: a way of protecting mobile agents from malicious hosts
-
International Conference on Web Engineering (ICWE 2003), Springer-Verlag, Berlin
-
Esparza O., Soriano M., Muñoz J.L., and Forné J. Host revocation authority: a way of protecting mobile agents from malicious hosts. International Conference on Web Engineering (ICWE 2003). LNCS vol. 2722 (2003), Springer-Verlag, Berlin
-
(2003)
LNCS
, vol.2722
-
-
Esparza, O.1
Soriano, M.2
Muñoz, J.L.3
Forné, J.4
-
11
-
-
18144431695
-
-
O. Esparza, M. Soriano, J.L. Muñoz, J. Forné, Punishing manipulation attacks in mobile agent systems, in: IEEE Global Telecommunications Conference (Globecom 2004), 2004.
-
-
-
-
13
-
-
33746117906
-
-
W.M. Farmer, J.D. Guttman, V. Swarup, Security for mobile agents: issues and requirements, in: 19th National Information Systems Security Conference, 1996.
-
-
-
-
14
-
-
0001943763
-
Time limited Blackbox security: protecting mobile agents from malicious hosts
-
Mobile Agents and Security, Springer-Verlag, Berlin
-
Hohl F. Time limited Blackbox security: protecting mobile agents from malicious hosts. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
-
(1998)
LNCS
, vol.1419
-
-
Hohl, F.1
-
15
-
-
33746152747
-
-
F. Hohl, A protocol to detect malicious hosts attacks by using reference states, 1999.
-
-
-
-
16
-
-
33746147731
-
-
R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, 1999. RFC 2459.
-
-
-
-
17
-
-
33746135600
-
-
ITU/ISO Recommendation, X.509 Information Technology Open Systems Interconnection - The Directory: Authentication Frameworks, 2000. Technical Corrigendum.
-
-
-
-
18
-
-
0034315517
-
-
W. Jansen, Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, 2000.
-
-
-
-
19
-
-
33746111128
-
-
W. Jansen, T. Karygiannis, Mobile Agent Security, Special publication 800-19, National Institute of Standards and Technology (NIST), 1999.
-
-
-
-
20
-
-
27544467699
-
The security hole in WAP: an analysis of the network and business rationales underlying a failure
-
Summer
-
Juul N.C., and Jørgensen N. The security hole in WAP: an analysis of the network and business rationales underlying a failure. International Journal of Electronic Commerce 7 4 (2003) 73 Summer
-
(2003)
International Journal of Electronic Commerce
, vol.7
, Issue.4
, pp. 73
-
-
Juul, N.C.1
Jørgensen, N.2
-
21
-
-
0010117897
-
-
T.S. Loon, V. Bharghavan, Alleviating the latency and bandwidth problems in WWW browsing, in: USENIX Symposium on Internet Technologies and Systems, 1997.
-
-
-
-
22
-
-
85015667755
-
-
Y. Minsky, R. van Renesse, F. Schneider, S.D. Stoller, Cryptographic support for fault-tolerant distributed computing, in: Seventh ACM SIGOPS European Workshop, 1996.
-
-
-
-
23
-
-
84888791839
-
-
J.L. Muñoz, J. Forné, Evaluation of Certificate Revocation Policies: OCSP vs. Overissued CRL, in: DEXA Workshops 2002. Workshop on Trust and Privacy in Digital Business (TrustBus02), pp. 511-515, IEEE Computer Society, 2002.
-
-
-
-
24
-
-
0242372132
-
Using OCSP to secure certificate-using transactions in m-commerce
-
Applied Cryptography and Network Security, Springer-Verlag, Berlin
-
Muñoz J.L., Forné J., Esparza O., Bernabe I., and Soriano M. Using OCSP to secure certificate-using transactions in m-commerce. Applied Cryptography and Network Security. LNCS vol. 2846 (2003), Springer-Verlag, Berlin 280-292
-
(2003)
LNCS
, vol.2846
, pp. 280-292
-
-
Muñoz, J.L.1
Forné, J.2
Esparza, O.3
Bernabe, I.4
Soriano, M.5
-
25
-
-
33746162323
-
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, 1999. RFC 2560.
-
-
-
-
26
-
-
0036687237
-
Security and usability proposal for mobile electronic commerce
-
Soriano M., and Ponce D. Security and usability proposal for mobile electronic commerce. IEEE Communications Magazine 40 (2002) 62-67
-
(2002)
IEEE Communications Magazine
, vol.40
, pp. 62-67
-
-
Soriano, M.1
Ponce, D.2
-
27
-
-
84947921326
-
Robust object watermarking: application to code
-
Information Hiding, Springer-Verlag, Berlin
-
Stern J.P., Hachez G., Koeune F., and Quisquater J.J. Robust object watermarking: application to code. Information Hiding. LNCS vol. 1768 (1999), Springer-Verlag, Berlin
-
(1999)
LNCS
, vol.1768
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.J.4
-
28
-
-
0002717089
-
Cryptographic traces for mobile agents
-
Mobile Agents and Security, Springer-Verlag, Berlin
-
Vigna G. Cryptographic traces for mobile agents. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
-
(1998)
LNCS
, vol.1419
-
-
Vigna, G.1
-
29
-
-
33746124916
-
-
ITU/ISO Recommendation X.509, Information technology Open Systems Interconnection - The Directory: Public Key and Attribute Certificate Frameworks, 1997.
-
-
-
|