-
1
-
-
35248895553
-
Privacy preserving trust agents
-
Technical Report HPL-2004-197, HP Labs, Bristol, UK, 11 November
-
S. Crane. Privacy preserving trust agents. Technical Report HPL-2004-197, HP Labs, Bristol, UK, 11 November 2004.
-
(2004)
-
-
Crane, S.1
-
2
-
-
35248861379
-
-
L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, 5. Schwab, and P. LeBlanc. Self-protecting mobile agents obfuscation report. Technical Report Report 03-015, Network Associates Laboratories, 2003.
-
L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, 5. Schwab, and P. LeBlanc. Self-protecting mobile agents obfuscation report. Technical Report Report 03-015, Network Associates Laboratories, 2003.
-
-
-
-
4
-
-
35248842207
-
-
E. Gallery and A. Tomlinson. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, 14-18 November 2005. Software Defined Radio Forum (SDRF).
-
E. Gallery and A. Tomlinson. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, 14-18 November 2005. Software Defined Radio Forum (SDRF).
-
-
-
-
5
-
-
0003954474
-
-
NIST Special Publication 800-19, National Institute of Standards and Technology NIST, Computer Security Division, Gaithersburg, Maryland, USA
-
W. Jansen and T. Karygiannis. Mobile agents and security. NIST Special Publication 800-19, National Institute of Standards and Technology (NIST), Computer Security Division, Gaithersburg, Maryland, USA, 1999.
-
(1999)
Mobile agents and security
-
-
Jansen, W.1
Karygiannis, T.2
-
6
-
-
35348989745
-
Trusted Computing
-
C. Mitchell, editor, The Institute of Electrical Engineers IEE, London, UK, April
-
C. Mitchell, editor. Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, April 2005.
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
-
-
-
7
-
-
2442419307
-
Trusted agents that enhance user privacy by self- profiling
-
Technical Report HPL-2002-196, HP Labs, Bristol, UK, 15 July
-
S. Pearson. Trusted agents that enhance user privacy by self- profiling. Technical Report HPL-2002-196, HP Labs, Bristol, UK, 15 July 2002.
-
(2002)
-
-
Pearson, S.1
-
8
-
-
84890042993
-
-
S. Pearson. How trusted computers can enhance for privacy preserving mobile applications. In Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), pages 609-613, Taormina, Sicily, Italy, 13-16 June 2005. IEEE Computer Society, Washington, DC, USA.
-
S. Pearson. How trusted computers can enhance for privacy preserving mobile applications. In Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), pages 609-613, Taormina, Sicily, Italy, 13-16 June 2005. IEEE Computer Society, Washington, DC, USA.
-
-
-
-
9
-
-
77953490662
-
A secure modular mobile agent system
-
Shanghai, China, 22-23 May, ACM Press, New York, USA
-
A. Pridgen and C. Julien. A secure modular mobile agent system. In Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems (SELMAS '06), pages 67-74, Shanghai, China, 22-23 May 2006. ACM Press, New York, USA.
-
(2006)
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems (SELMAS '06)
, pp. 67-74
-
-
Pridgen, A.1
Julien, C.2
-
10
-
-
0003249402
-
Environmental key generation towards clueless agents
-
G. Vigna, editor, Mobile Agents and Security, of, Springer-Verlag, Berlin-Heidelberg, Germany
-
J. Riordan and Bruce Schneier. Environmental key generation towards clueless agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Comptuer Science (LNCS), pages 15-24. Springer-Verlag, Berlin-Heidelberg, Germany, 1998.
-
(1998)
Lecture Notes in Comptuer Science
, vol.1419
, pp. 15-24
-
-
Riordan, J.1
Schneier, B.2
-
11
-
-
84947912805
-
Secure recording of itineraries through co-operating agents
-
20-24 July
-
V. Roth. Secure recording of itineraries through co-operating agents. In Workshop ion on ObjectOriented Technology (ECOOP '98), pages 297-298, 20-24 July 1998.
-
(1998)
Workshop ion on ObjectOriented Technology (ECOOP '98)
, pp. 297-298
-
-
Roth, V.1
-
12
-
-
0442286133
-
Mobile agents
-
A. Kent and J.G. Williams, editors, M. Dekker Inc, New York, USA
-
K. Rothermel and M. Schwehm. Mobile agents. In A. Kent and J.G. Williams, editors, Encyclopedia for Computer Science and Technology, volume 40, pages 155-176. M. Dekker Inc., New York, USA, 1999.
-
(1999)
Encyclopedia for Computer Science and Technology
, vol.40
, pp. 155-176
-
-
Rothermel, K.1
Schwehm, M.2
-
13
-
-
35248819427
-
TCG Specification Architecture Overview
-
TCG, Version 1.2, The Trusted Computing Group TCG, Portland, Oregon, USA, April
-
TCG. TCG Specification Architecture Overview. TCG Specification Version 1.2, The Trusted Computing Group (TCG), Portland, Oregon, USA, April 2003.
-
(2003)
TCG Specification
-
-
-
14
-
-
0002717089
-
Cryptographic traces for mobile agents
-
G. Vigna, editor, Mobile Agents and Security, of, Springer-Verlag, Berlin-Heidelberg, Germany
-
G. Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, pages 137-153. Springer-Verlag, Berlin-Heidelberg, Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 137-153
-
-
Vigna, G.1
-
16
-
-
84982994321
-
Introducing trusted third parties to the mobile agent paradigm
-
J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag, London, UK
-
U.G. Wilhelm, S. Staamann, and L. Butty. Introducing trusted third parties to the mobile agent paradigm. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume Lecture Notes In Computer Science, pages 469-489. Springer-Verlag, London, UK, 1999.
-
(1999)
Lecture Notes In Computer Science
, pp. 469-489
-
-
Wilhelm, U.G.1
Staamann, S.2
Butty, L.3
|