메뉴 건너뛰기




Volumn 2828, Issue , 2003, Pages 89-103

Java obfuscation with a theoretical basis for building secure mobile agents

Author keywords

Computational complexity; Mobile agents; Obfuscation; Security; Static analysis

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SOFTWARE; JAVA PROGRAMMING LANGUAGE; OBJECT ORIENTED PROGRAMMING; STATIC ANALYSIS;

EID: 35248814855     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45184-6_8     Document Type: Article
Times cited : (11)

References (11)
  • 1
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, G., ed.: Mobile Agents Security. Springer-Verlag
    • Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In Vigna, G., ed.: Mobile Agents Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag (1998) 92-113
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 2
    • 0004046658 scopus 로고    scopus 로고
    • Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand
    • Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand (1997)
    • (1997) A Taxonomy of Obfuscating Transformations
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 3
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Anderson, R.J., ed.: Information Hiding: First International Workshop. Springer-Verlag
    • Aucsmith, D.: Tamper resistant software: An implementation. In Anderson, R.J., ed.: Information Hiding: First International Workshop. Volume 1174 of Lecture Notes in Computer Science., Springer-Verlag (1996) 317-333
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 9
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Vign, G., ed.: Mobile Agents and Security. Springer-Verlag
    • Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In Vign, G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag (1998) 44-60
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 10
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agents in hostile environments
    • Information Security and Privacy: Fifth Australasian Conference on Information Security and Privacy, ACISP 2000. Springer-Verlag
    • Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: Secure transactions with mobile agents in hostile environments. In: Information Security and Privacy: Fifth Australasian Conference on Information Security and Privacy, ACISP 2000. Volume 1841 of Lecture Notes in Computer Science., Springer-Verlag (2000) 289-297
    • (2000) Lecture Notes in Computer Science , vol.1841 , pp. 289-297
    • Kotzanikolaou, P.1    Burmester, M.2    Chrissikopoulos, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.