-
2
-
-
79251578513
-
On the (Im)possibility of obfuscating programs. Advances in cryptology
-
Proceedings of Crypto'2001
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. Advances in cryptology. In: Proceedings of Crypto'2001, Lecture Notes in Computer Science, Vol. 2139, pp. 1-18 (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
33947609379
-
On the possibility of practically obfuscating program-towards a unified perspective of code protection
-
WTCV'06 Special Issue, G. Boufante, I., Marion, J.Y. (eds)
-
Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating program-towards a unified perspective of code protection. WTCV'06 Special Issue, G. Boufante, I., Marion, J.Y. (eds) J. Comput.Virol. 3(1) (2007)
-
(2007)
J. Comput.Virol.
, vol.3
, Issue.1
-
-
Beaucamps, P.1
Filiol, E.2
-
4
-
-
0012096118
-
Computing functions of a shared secret
-
3
-
Beimel A. and Burmester M. (2000). Computing functions of a shared secret. SIAM J. Discrete Math. 13(3): 324-345
-
(2000)
SIAM J. Discrete Math.
, vol.13
, pp. 324-345
-
-
Beimel, A.1
Burmester, M.2
-
5
-
-
77952490155
-
Security for mobile agents: Issues and challenges
-
Mahgoub, I., Ilyas, M. (eds) CRC, Boca Raton
-
Bellavista, P., Corradi, A., Frederici C., Montanari R., Tibaldi D.: Security for mobile agents: issues and challenges. In: Mahgoub, I., Ilyas, M. (eds) The Book Handbook of Mobile Computing. CRC, Boca Raton (2004)
-
(2004)
The Book Handbook of Mobile Computing
-
-
Bellavista, P.1
Corradi, A.2
Frederici, C.3
Montanari, R.4
Tibaldi, D.5
-
6
-
-
23944459002
-
Classification of malicious host threats in mobile agent computing
-
Bierman, E., Cloete, E.: Classification of malicious host threats in mobile agent computing. In: Proceedings of SACICSIT2002, pp. 141-148 (2002)
-
(2002)
Proceedings of SACICSIT2002
, pp. 141-148
-
-
Bierman, E.1
Cloete, E.2
-
8
-
-
0012003998
-
Trust revelation in multiagent interaction
-
Workshop on the Philosophy and Design of Socially Adept Technologies, Minneapolis
-
Braynov, S., Sandhol, T.: Trust revelation in multiagent interaction. In: Proceedings of CHI'02, Workshop on the Philosophy and Design of Socially Adept Technologies, Minneapolis (2002)
-
(2002)
Proceedings of CHI'02
-
-
Braynov, S.1
Sandhol, T.2
-
9
-
-
2442549069
-
Using trust for secure collaboration in uncertain environment
-
3
-
Cahill V. (2003). Using trust for secure collaboration in uncertain environment. IEEE Pervasive Comput. 2(3): 52-61
-
(2003)
IEEE Pervasive Comput.
, vol.2
, pp. 52-61
-
-
Cahill, V.1
-
11
-
-
0004004188
-
-
Technical Report, IBM T.J. Watson Research Center, NY
-
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. Technical Report, IBM T.J. Watson Research Center, NY (1995)
-
(1995)
Itinerant Agents for Mobile Computing
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
12
-
-
14944350676
-
-
Network Associates Laboratories Report
-
D'Anna, L., Matt, B., Reisse, A., Van Vleck, T., Schwab, S., LeBlanc, P.: Self-protecting mobile agents obfuscation report. Network Associates Laboratories Report (2003)
-
(2003)
Self-protecting Mobile Agents Obfuscation Report
-
-
D'Anna, L.1
Matt, B.2
Reisse, A.3
Van Vleck, T.4
Schwab, S.5
Leblanc, P.6
-
13
-
-
7044221923
-
A service-oriented trust management framework
-
Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, reputation, and security: theories and practice Springer, Heidelberg
-
Dimitrakos, T.: A service-oriented trust management framework. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, reputation, and security: theories and practice, LNAI 2631. Springer, Heidelberg, pp. 53-72 (2003)
-
(2003)
LNAI
, vol.2631
, pp. 53-72
-
-
Dimitrakos, T.1
-
14
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: authentication and state appraisal. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 118-130 (1996)
-
(1996)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
15
-
-
33746882722
-
Strong cryptography armoured computer viruses forbidding code analysis: The bradley virus
-
Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: Proceedings of the 14th EICAR Conference (2005)
-
(2005)
Proceedings of the 14th EICAR Conference
-
-
Filiol, E.1
-
17
-
-
33748978409
-
Malware pattern scanning schemes secure against black-box analysis
-
EICAR 2006 Special Issue, Broucek I, V., Turnee, P. (eds)
-
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. EICAR 2006 Special Issue, Broucek I, V., Turnee, P. (eds) J. Comput. Virol. 2(1), (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.1
-
-
Filiol, E.1
-
20
-
-
0032203850
-
Secure java class loading
-
Gong, L.: Secure java class loading. IEEE Internet Comput. 56-61 (1998)
-
(1998)
IEEE Internet Comput.
, pp. 56-61
-
-
Gong, L.1
-
21
-
-
4544372344
-
Monitoring and organizational-level adaptation of multi-agent systems
-
ACM, New York
-
Guessoum, Z., Ziane, M., Faci, N.: Monitoring and organizational-level adaptation of multi-agent systems. In: AAMAS'04. ACM, New York, pp. 514-522 (2004)
-
(2004)
AAMAS'04
, pp. 514-522
-
-
Guessoum, Z.1
Ziane, M.2
Faci, N.3
-
22
-
-
35348958221
-
Using a trust-based key to protect mobile agent code
-
ISSN 1305-5313, World Enformatika Society, CCIS'2006, Venice, Italy
-
Hacini, S., Guessoum, Z., Boufaida, Z: Using a trust-based key to protect mobile agent code. In: Transactions on Engineering, Computing and Technology, vol. 16, ISSN 1305-5313, World Enformatika Society, CCIS'2006, Venice, Italy, pp. 326-332 (2006)
-
(2006)
Transactions on Engineering, Computing and Technology
, vol.16
, pp. 326-332
-
-
Hacini, S.1
Guessoum, Z.2
Boufaida, Z.3
-
25
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Vigna, G. (ed) Mobile agents and security Springer, Heidelberg
-
Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed) Mobile agents and security. Lecture Notes in Computer Science, Vol. 1419, pp. 52-59. Springer, Heidelberg (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 52-59
-
-
Hohl, F.1
-
26
-
-
0003954474
-
-
NIST Special Publication 800-19, National Institute of Standard and Technology
-
Jansen, W., Karygiannis, T.: Mobile agent security. NIST Special Publication 800-19, National Institute of Standard and Technology (2000)
-
(2000)
Mobile Agent Security
-
-
Jansen, W.1
Karygiannis, T.2
-
27
-
-
0242719010
-
Trust-based decision making for electronic transactions
-
Stockholm University Report 99-005, Stockholm
-
Josang, A.: Trust-based decision making for electronic transactions. In: The fourth Nordic Workshop on Secure ITSystems (NORDSEC'99), Stockholm University Report 99-005, Stockholm (1999)
-
(1999)
The Fourth Nordic Workshop on Secure ITSystems (NORDSEC'99)
-
-
Josang, A.1
-
30
-
-
0003802916
-
-
PhD thesis, Department of Computer Sciences and Engineering, University of Minnesota, Minneapolis, USA
-
Karnik, N.: Security in mobile agents systems. PhD thesis, Department of Computer Sciences and Engineering, University of Minnesota, Minneapolis, USA (1998)
-
(1998)
Security in Mobile Agents Systems
-
-
Karnik, N.1
-
31
-
-
85094191470
-
Puppeteer: Component based adaptation for mobile computing
-
De Lara, E., Wallach, D.S., Zwaenepoel, W.: Puppeteer: component based adaptation for mobile computing. In: Proceedings of the Third USENIX Symposium on Internet Technologies and Systems, pp. 159-170 (2001)
-
(2001)
Proceedings of the Third USENIX Symposium on Internet Technologies and Systems
, pp. 159-170
-
-
De Lara, E.1
Wallach, D.S.2
Zwaenepoel, W.3
-
32
-
-
0242340728
-
Modelling and evaluating trust relationships in mobile agent based systems
-
Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS03) Springer, Kunming
-
Lin, C., Varadharajan V.: Modelling and evaluating trust relationships in mobile agent based systems. In: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS03), Lecture Notes in Computer Science, Vol. 2846, pp. 176-190. Springer, Kunming (2003)
-
(2003)
Lecture Notes in Computer Science
, vol.2846
, pp. 176-190
-
-
Lin, C.1
Varadharajan, V.2
-
33
-
-
35048873712
-
On the design of a new trust model for mobile agent security
-
The 1st International Conference on Trust and Privacy in Digital Business (TrustBus04) Springer, Zaragoza
-
Lin, C., Varadharajan V., Wang Y., Mu Y.: On the design of a new trust model for mobile agent security. In: The 1st International Conference on Trust and Privacy in Digital Business (TrustBus04), Lecture Notes in Computer Science, Vol. 3184, pp. 60-69. Springer, Zaragoza (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.3184
, pp. 60-69
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Mu, Y.4
-
34
-
-
33749069980
-
-
Manuscript
-
Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust enhanced security for mobile agents. Manuscript (2005)
-
(2005)
Trust Enhanced Security for Mobile Agents
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Pruthi, V.4
-
36
-
-
0033893895
-
E-commerce trust metrics and models
-
Manchala, D.W.: E-commerce trust metrics and models. IEEE Internet Comput. 36-44 (2000)
-
(2000)
IEEE Internet Comput.
, pp. 36-44
-
-
Manchala, D.W.1
-
37
-
-
35048873712
-
On the design of a new trust model for mobile agent security, trust and privacy in digital business
-
Springer, Berlin
-
Mu, Y., Lin, C., Varadharajan, V., Wang, Y.: On the design of a new trust model for mobile agent security, trust and privacy in digital business. Lecture Notes in Computer Science, Vol. 3184, pp. 60-69. Springer, Berlin (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.3184
, pp. 60-69
-
-
Mu, Y.1
Lin, C.2
Varadharajan, V.3
Wang, Y.4
-
41
-
-
0003249402
-
Environment key generation towards clueless agents
-
Riordan J. and Schneier B. (1998). Environment key generation towards clueless agents. Lect. Notes Comput. Sci. 1419: 15-24
-
(1998)
Lect. Notes Comput. Sci.
, vol.1419
, pp. 15-24
-
-
Riordan, J.1
Schneier, B.2
-
43
-
-
0037885444
-
Mutual protection of cooperating agents
-
Vitek, J., Jensen, C. (eds) Springer, Heidelberg
-
Roth, V.: Mutual protection of cooperating agents. In: Vitek, J., Jensen, C. (eds) Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer, Heidelberg (1999)
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
-
-
Roth, V.1
-
46
-
-
0031681561
-
Toward mobile cryptography
-
IEEE Computer Soc. Press, Los Alamitos
-
Sander, T., Tschudin, C.: Toward mobile cryptography. IEEE Symposium Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, pp. 215-224 (1998)
-
(1998)
IEEE Symposium Security and Privacy
, pp. 215-224
-
-
Sander, T.1
Tschudin, C.2
-
47
-
-
0003197918
-
Protecting mobile agent against malicious hosts
-
Springer Berlin
-
Sander T. and Tschudin C. (1998). Protecting mobile agent against malicious hosts. In: Vigna, G. (eds) Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419, pp 44-60. Springer, Berlin
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.2
Vigna, G.3
-
49
-
-
84948187986
-
Trust relationships in a mobile agent system
-
Picco, G.P. (ed) Fifth IEEE International Conference on Mobile Agents Springer, Atlanta
-
Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G.P. (ed) Fifth IEEE International Conference on Mobile Agents, Lecture Notes in Computer Science, vol. 2240. Springer, Atlanta (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2240
-
-
Tan, H.K.1
Moreau, L.2
-
51
-
-
0037083318
-
Integrity protection for Code-On-Demand Mobile Agents in E-Commerce
-
Wang T., Guan S. and Khoon Chan T. (2000). Integrity protection for Code-On-Demand Mobile Agents in E-Commerce. J. Syst. Softw. 60: 211-221
-
(2000)
J. Syst. Softw.
, vol.60
, pp. 211-221
-
-
Wang, T.1
Guan, S.2
Khoon Chan, T.3
-
52
-
-
0034272456
-
A pessimistic approach to trust in mobile agent platforms
-
ISSN: 1089-7801
-
Wilhelm, U.G., Staamann, S.M., Buttyan, L.: A pessimistic approach to trust in mobile agent platforms. IEEE Internet Comput. 45, ISSN: 1089-7801, pp. 40-48 (2000)
-
(2000)
IEEE Internet Comput.
, vol.45
, pp. 40-48
-
-
Wilhelm, U.G.1
Staamann, S.M.2
Buttyan, L.3
-
55
-
-
33244459571
-
Secure coprocessors in electronic commerce applications
-
Usenix Assoc., Berkeley
-
Yee, B., Tygar, D.: Secure coprocessors in electronic commerce applications. In: The Proceeding of First Usenix Workshop on Electronic Commerce, Usenix Assoc., Berkeley, pp. 155-170 (1995)
-
(1995)
The Proceeding of First Usenix Workshop on Electronic Commerce
, pp. 155-170
-
-
Yee, B.1
Tygar, D.2
|