-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, A CM Transactions on Computer Systems, vol.1, no.3, pp.239-248, 1983.
-
(1983)
A CM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0032121340
-
Access control and key management for mobile agents
-
R. Volker and J. S. Mehrdad, Access control and key management for mobile agents, Computer Graphics, vol.22, no.4, pp.457-461, 1998.
-
(1998)
Computer Graphics
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
3
-
-
85008004932
-
Mobile software agents for telecommunications, guest editorial
-
A. Karmouch, Mobile software agents for telecommunications, guest editorial, IEEE Communications Magazine, vol.36, no.7, pp.24-25, 1998.
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.7
, pp. 24-25
-
-
Karmouch, A.1
-
4
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
L.-C. Lin, H.-H. Ou and M.-S. Hwang, Efficient access control and key management schemes for mobile agents, Computer Standards & Interfaces, vol.26, no.5, pp.423-433, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, L.-C.1
Ou, H.-H.2
Hwang, M.-S.3
-
6
-
-
0003640863
-
-
Addison-Wesley Press, MA, USA
-
D. B. Lange and M. Oshima, Programming and, Deploying Java, Mobile Agents with Aglets, Addison-Wesley Press, MA, USA, 1998.
-
(1998)
Programming And, Deploying Java, Mobile Agents with Aglets
-
-
Lange, D.B.1
Oshima, M.2
-
8
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, no.177, pp.203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
9
-
-
33947216640
-
-
M. A. Aydin and G. Z. Aydin, A survey of elliptic curve cryptography, vol.6, no.2, pp.211-221, 2006.
-
(2006)
A Survey of Elliptic Curve Cryptography
, vol.6
, Issue.2
, pp. 211-221
-
-
Aydin, M.A.1
Aydin, G.Z.2
-
10
-
-
54349095337
-
Efficient migration for mobile computing in distributed networks
-
K.-H. Huang, Y.-F. Chung, C.-H. Liu, F. Lai and T.-S. Chen, Efficient migration for mobile computing in distributed networks, Computer Standards & Interfaces, vol.31, no.l, pp.40-47, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 40-47
-
-
Huang, K.-H.1
Chung, Y.-F.2
Liu, C.-H.3
Lai, F.4
Chen, T.-S.5
-
12
-
-
70349084070
-
-
Ph.D. Thesis, National Taiwan University of Science and Technology, Taipei
-
S. T. Wu, Authentication and, Group Secure Communications Using Elliptic Curve Cryptography, Ph.D. Thesis, National Taiwan University of Science and Technology, Taipei, 2005.
-
(2005)
Authentication And, Group Secure Communications Using Elliptic Curve Cryptography
-
-
Wu, S.T.1
-
13
-
-
70349089628
-
-
Master Thesis, National Sun Yat-sen University of Technology, Kaohsiung
-
J. Guan and L. H. Jen, Study and, Implementation of Elliptic Curve Cryptosystem, Master Thesis, National Sun Yat-sen University of Technology, Kaohsiung, 2005.
-
(2005)
Study And, Implementation of Elliptic Curve Cryptosystem
-
-
Guan, J.1
Jen, L.H.2
-
14
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
H. Y. Chien, Efficient time-bound hierarchical key assignment scheme, IEEE Trans. Knowledge and, Data, Engineering, vol.16, no.10, pp.1301-1304, 2004.
-
(2004)
IEEE Trans. Knowledge And, Data, Engineering
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chien, H.Y.1
-
15
-
-
43649095362
-
An efficient time-bound hierarchical key management scheme for secure broadcasting
-
E. Bertino, N. Shang and S. S. Wagstaff, An efficient time-bound hierarchical key management scheme for secure broadcasting, IEEE Trans. Actions on Dependable and, Secure Computing, vol.5, no.2, pp.65-70, 2008.
-
(2008)
IEEE Trans. Actions on Dependable And, Secure Computing
, vol.5
, Issue.2
, pp. 65-70
-
-
Bertino, E.1
Shang, N.2
Wagstaff, S.S.3
-
16
-
-
63549087822
-
Hierarchical control in a multiagent system
-
A. Damba and S. Watanabe, Hierarchical control in a multiagent system, International Journal of Innovative Computing, Information and, Control, vol.4, no.12, pp.3091-3100, 2008.
-
(2008)
International Journal of Innovative Computing, Information And, Control
, vol.4
, Issue.12
, pp. 3091-3100
-
-
Damba, A.1
Watanabe, S.2
-
17
-
-
63649116212
-
A pilot study on modeling and analysis of capricious agents in agent-based simulations
-
N. Nakano, A pilot study on modeling and analysis of capricious agents in agent-based simulations, International Journal of Innovative Computing, Information and, Control, vol.4, no.l, pp.91-100, 2008.
-
(2008)
International Journal of Innovative Computing, Information And, Control
, vol.4
, Issue.1
, pp. 91-100
-
-
Nakano, N.1
|