-
1
-
-
84964820465
-
Security issues in mobile agent technology
-
Corradi A., Montanari R., and Stefanelli C. Security issues in mobile agent technology. Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems", Cape Town, South Africa (1999) 3-8
-
(1999)
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems", Cape Town, South Africa
, pp. 3-8
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
2
-
-
85008004932
-
Mobile software agents for telecommunications, guest editorial
-
Karmouch A. Mobile software agents for telecommunications, guest editorial. IEEE Communications Magazine 36 No. 7 (July 1998) 24-25
-
(1998)
IEEE Communications Magazine
, vol.36 7
, pp. 24-25
-
-
Karmouch, A.1
-
3
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems 1 No. 3 (1983) 239-248
-
(1983)
ACM Transaction on Computer Systems
, vol.1 3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
6
-
-
0029392001
-
Itinerant agents for mobile computing
-
Chess D., Grosof B., Harrison C., Levine D., Parris C., and Tsudik G. Itinerant agents for mobile computing. IEEE Personal Communications 2 No. 5 (October 1995) 34-49
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
8
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
Lin I.C., Ou H.H., and Hwang M.S. Efficient access control and key management schemes for mobile agents. Computer Standards and Interfaces 26 No. 5 (2004) 423-433
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, I.C.1
Ou, H.H.2
Hwang, M.S.3
-
9
-
-
0033334588
-
A cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Kuo F.H., Shen V.R.L., Chen T.S., and Lai F. A cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceeding on Computers & Digital Techniques 146 No. 5 (Sept. 1999) 235-240
-
(1999)
IEE Proceeding on Computers & Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.L.2
Chen, T.S.3
Lai, F.4
-
10
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
Lin C.H. Dynamic key management schemes for access control in a hierarchy. Computer Communications 20 No. 15 (Dec. 15 1997) 1381-1385
-
(1997)
Computer Communications
, vol.20
, Issue.15
, pp. 1381-1385
-
-
Lin, C.H.1
-
11
-
-
0000370732
-
A new dynamic key generation scheme for access control in a hierarchy
-
Hwang M.S. A new dynamic key generation scheme for access control in a hierarchy. Nordic Journal of Computing 6 No. 4 (1999) 363-371
-
(1999)
Nordic Journal of Computing
, vol.6
, Issue.4
, pp. 363-371
-
-
Hwang, M.S.1
-
12
-
-
0033751899
-
An asymmetric cryptographic scheme for a totally-ordered hierarchy
-
Hwang M.S. An asymmetric cryptographic scheme for a totally-ordered hierarchy. International Journal of Computer Mathematics 73 No. 4 (2000) 463-468
-
(2000)
International Journal of Computer Mathematics
, vol.73
, Issue.4
, pp. 463-468
-
-
Hwang, M.S.1
-
13
-
-
0012922503
-
An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
-
Hwang M.S. An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Computers & Mathematics with Applications 37 No. 3 (February 1999) 19-22
-
(1999)
Computers & Mathematics with Applications
, vol.37 3
, pp. 19-22
-
-
Hwang, M.S.1
-
15
-
-
0033908596
-
Cryptanalysis of YCN key assignment scheme in a hierarchy
-
Hwang M.S. Cryptanalysis of YCN key assignment scheme in a hierarchy. Information Processing Letters 73 No. 3 (February 2000) 97-101
-
(2000)
Information Processing Letters
, vol.73 3
, pp. 97-101
-
-
Hwang, M.S.1
-
16
-
-
0032663530
-
Extension of CHW cryptographic key assignment scheme in a hierarchy
-
Hwang M.S. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings-Computers and Digital Techniques 146 No. 4 (July 1999) 219
-
(1999)
IEE Proceedings-Computers and Digital Techniques
, vol.146
, Issue.4
, pp. 219
-
-
Hwang, M.S.1
-
19
-
-
0032121340
-
Access control and key management for mobile agents
-
Volker R., and Mehrdad J.S. Access control and key management for mobile agents. Computer Graphics 22 No. 4 (August 1998) 457-461
-
(1998)
Computer Graphics
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
20
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1 No. 3 (August 1983) 239-248
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
21
-
-
68849096323
-
-
Online] Available
-
Search-"Generalmagic," [Online] Available: http://www.generalmagic.com.
-
Search-Generalmagic
-
-
-
22
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
-
Chen T.S., and Chung Y.F. Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security 21 No. 6 (2002) 565-570
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 565-570
-
-
Chen, T.S.1
Chung, Y.F.2
-
25
-
-
29344440987
-
Index calculation attacks on RSA signature and encryption
-
Coron J.S., Naccache D., Desmedt Y., Odlyzko A., and Stern J.P. Index calculation attacks on RSA signature and encryption. Designs, Codes and Cryptography 38 No. 1 (2006) 41-53
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.1
, pp. 41-53
-
-
Coron, J.S.1
Naccache, D.2
Desmedt, Y.3
Odlyzko, A.4
Stern, J.P.5
-
26
-
-
32644451622
-
A new solution for assigning cryptographic key to control access in mobile agent environments
-
Chang C.C., and Lin C.I. A new solution for assigning cryptographic key to control access in mobile agent environments. Wireless Communications and Mobile Computing 6 No. 1 (2006) 137-146
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.1
, pp. 137-146
-
-
Chang, C.C.1
Lin, C.I.2
-
27
-
-
0035452725
-
Mobile agent evolution computing
-
Shih T.K. Mobile agent evolution computing. Information Sciences 137 No. 1 (2001) 53-73
-
(2001)
Information Sciences
, vol.137 1
, pp. 53-73
-
-
Shih, T.K.1
-
29
-
-
0001943763
-
Time limited Black Box Security: protecting mobile agent from malicious hosts
-
Springer Verlag, Berlin
-
Hohl F. Time limited Black Box Security: protecting mobile agent from malicious hosts. Lecture Notes in Computer Science-Mobile Agents and Security 1419 (1998), Springer Verlag, Berlin 92-113
-
(1998)
Lecture Notes in Computer Science-Mobile Agents and Security
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
|