-
2
-
-
0008921315
-
Electronic commerce with secure intelligent trade agent
-
Jaco van der Merwe and Sebastiaan von Solms, Electronic Commerce with Secure Intelligent Trade Agents, Proc. First International Conference on Information and Communications Security, Beijing, China, November, 1997, pp.452-462. (Pubitemid 127148074)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 452-462
-
-
Van Der Merwe, J.1
Von Solms, S.H.2
-
3
-
-
34548139401
-
The International Journal of Information Security special issue on privacy, security and trust technologies and E-business services
-
DOI 10.1007/s10207-007-0036-8
-
Scott Knight, Scott Buffett and Patrick Hung, The International Journal of Information Security Special Issue on Privacy, Security and Trust Technologies and E-Business Services, The International Journal of Information Security, Vol. 6, No. 3, 2007, pp.285-286. (Pubitemid 47299555)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.5
, pp. 285-286
-
-
Knight, S.1
Buffett, S.2
Hung, P.C.K.3
-
4
-
-
32544460288
-
Automated silicon intellectual property trade using mobile agent technology
-
DOI 10.1016/j.rcim.2005.03.003, PII S0736584505000384
-
Amy Trappey, Charles Trappey and Felix Lin, Automated Silicon Intellectual Property Trade Using Mobile Agent Technology, Robotics and Computer-Integrated Manufacturing, Vol. 22, No. 3, 2006, pp.189-202. (Pubitemid 43233757)
-
(2006)
Robotics and Computer-Integrated Manufacturing
, vol.22
, Issue.3
, pp. 189-202
-
-
Trappey, A.J.C.1
Trappey, C.V.2
Lin, F.T.L.3
-
5
-
-
10644266748
-
Mobile agents for a brokering service in the electronic marketplace
-
Timon Chih-Ting Du, Eldon Li and Eric Wei, Mobile Agents for a Brokering Service in the Electronic Marketplace, Decision Support Systems, Vol. 39, No. 3, 2005, pp.371-383.
-
(2005)
Decision Support Systems
, vol.39
, Issue.3
, pp. 371-383
-
-
Du Timon, C.-T.1
Li, E.2
Wei, E.3
-
6
-
-
74549210594
-
A multi-agent protocol for multilateral negotiations in supply chain management
-
Tenan Wong and Fang Fang, A Multi-agent Protocol for Multilateral Negotiations in Supply Chain Management, International Journal of Production Research, Vol. 48, No. 1, 2010, pp.271-299.
-
(2010)
International Journal of Production Research
, vol.48
, Issue.1
, pp. 271-299
-
-
Wong, T.1
Fang, F.2
-
7
-
-
0034315517
-
Countermeasures for mobile agent security
-
DOI 10.1016/S0140-3664(00)00253-X
-
Wayne Jansen, Countermeasures for Mobile Agent Security, Computer Communications, Vol. 24, No. 13, 2000, pp.1667-1676. (Pubitemid 32033567)
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1667-1676
-
-
Jansen, W.A.1
-
8
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Mobile Agents and Security
-
Fritz Hohl, Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, Lecture Notes in Computer Science, Vol. 1419, 1998, pp.92-113. (Pubitemid 128104564)
-
(1998)
Lecture Notes in Computer Science
, Issue.1419
, pp. 92-113
-
-
Hohl, F.1
-
9
-
-
0031620963
-
Breaking abstractions and unstructuring data structures
-
Chicago, IL, May
-
Christian Collberg, Clark Thomborson and Douglas Low, Breaking Abstractions and Unstructuring Data Structures, Proc. IEEE International Conference on Computer Languages, Chicago, IL, May, 1998, pp.28-38.
-
(1998)
Proc. IEEE International Conference on Computer Languages
, pp. 28-38
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation tools for software protection
-
Christian Collberg, Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection, IEEE Transactions on Software Engineering, Vol. 28, No. 8, 2002, pp.735-746.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
-
11
-
-
0031649930
-
Manufacturing cheap resilient, and stealthy opaque constructs
-
New York, January
-
Christian Collberg, Clark Thomborson and Douglas Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, Proc. the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, New York, January, 1998, pp.184-196.
-
(1998)
Proc. The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
84957893114
-
On software protection via function hiding
-
Portland, OR, April
-
Tomas Sander and Christian Tschudin, On Software Protection via Function Hiding, Proc. the Second Workshop on Information Hiding, Portland, OR, April, 1998, pp.111-123.
-
(1998)
Proc. The Second Workshop on Information Hiding
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.2
-
13
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Mobile Agents and Security
-
Tomas Sander and Christian Tschudin, Protecting Mobile Agents Against Malicious Hosts, Lecture Notes in Computer Science, Vol. 1419, 1998, pp.44-60. (Pubitemid 128104562)
-
(1998)
Lecture Notes in Computer Science
, Issue.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
14
-
-
70349739583
-
Efficient threshold proxy signature protocol for mobile agents
-
Xuan Hong, Efficient Threshold Proxy Signature Protocol for Mobile Agents, Information Sciences, Vol. 179, No. 24, 2009, pp.4243-4248.
-
(2009)
Information Sciences
, vol.179
, Issue.24
, pp. 4243-4248
-
-
Hong, X.1
-
15
-
-
54349116468
-
Secure multiple-times proxy signature scheme
-
Xuan Hong and Ke-Fei Chen, Secure Multiple-Times Proxy Signature Scheme, Computer Standards and Interfaces, Vol. 31, No. 1, 2009, pp.19-23.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.1
, pp. 19-23
-
-
Hong, X.1
Chen, K.-F.2
-
16
-
-
78651548824
-
Key management and authentication in ad hoc network based on mobile agent
-
Yi Zhang, Lina Zhu and Li Feng, Key Management and Authentication in Ad Hoc Network Based on Mobile Agent, Journal of Networks, Vol. 4, No. 6, 2009, pp.487-494.
-
(2009)
Journal of Networks
, vol.4
, Issue.6
, pp. 487-494
-
-
Zhang, Y.1
Zhu, L.2
Feng, L.3
-
17
-
-
68849100401
-
Efficient migration access control for mobile agents
-
Yu-Fang Chung, Tzer-Shyong Chen and Ming-Wei Lai, Efficient Migration Access Control for Mobile Agents, Computer Standards and Interfaces, Vol. 31, No. 6, 2009, pp.1061-1068.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1061-1068
-
-
Chung, Y.-F.1
Chen, T.-S.2
Lai, M.-W.3
-
18
-
-
58549101274
-
Protecting mobile agents from external replay attacks
-
Carles Garrigues, Nikos Migas, William Buchanan, Sergi Robles and Joan Borrell, Protecting Mobile Agents from External Replay Attacks, Journal of Systems and Software, Vol. 82, No. 2, 2009, pp.197-206.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.2
, pp. 197-206
-
-
Garrigues, C.1
Migas, N.2
Buchanan, W.3
Robles, S.4
Borrell, J.5
-
19
-
-
75649119577
-
Constructing secure mobile agent systems using the agent operating system
-
Guido Van't Noordende, Benno Overeinder, Reinier Timmer, Frances Brazier and Andrew Tanenbaum, Constructing Secure Mobile Agent Systems Using the Agent Operating System, International Journal of Intelligent Information and Database Systems, Vol. 3, No. 4, 2009, pp.363-381.
-
(2009)
International Journal of Intelligent Information and Database Systems
, vol.3
, Issue.4
, pp. 363-381
-
-
Van't Noordende, G.1
Overeinder, B.2
Timmer, R.3
Brazier, F.4
Tanenbaum, A.5
-
20
-
-
77956183594
-
A secure mobile agents platform
-
Leila Ismail, A Secure Mobile Agents Platform, Journal of Communications, Vol. 3, No. 2, 2008, pp.1-21.
-
(2008)
Journal of Communications
, vol.3
, Issue.2
, pp. 1-21
-
-
Ismail, L.1
-
21
-
-
54949120548
-
Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)
-
Sathish Babu and Pallapa Venkataram, Cognitive Agents Based Authentication & Privacy Scheme for Mobile Transactions (CABAPS), Computer Communications, Vol. 31, No. 17, 2008, pp.4060-4071.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 4060-4071
-
-
Babu, S.1
Venkataram, P.2
-
22
-
-
47949098347
-
Securing dynamic itineraries for mobile agent applications
-
Carles Garrigues, Sergi Robles and Joan Borrell, Securing Dynamic Itineraries for Mobile Agent Applications, Journal of Network and Computer Applications, Vol. 31, No. 4, 2008, pp.487-508.
-
(2008)
Journal of Network and Computer Applications
, vol.31
, Issue.4
, pp. 487-508
-
-
Garrigues, C.1
Robles, S.2
Borrell, J.3
-
23
-
-
39749129337
-
Secure and auditable agent-based e-marketplace framework for mobile users
-
DOI 10.1016/j.csi.2007.10.009, PII S0920548907000980
-
Norleyza Jailani, Noor Yatim, Mohd Faezah, Yazrina Yahya, Ahmed Patel and Mazliza Othman, Secure and Auditable Agent-Based E-Marketplace Framework for Mobile Users, Computer Standards and Interfaces, Vol. 30, No. 4, 2008, pp.237-252. (Pubitemid 351295968)
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.4
, pp. 237-252
-
-
Jailani, N.1
Yatim, N.F.M.2
Yahya, Y.3
Patel, A.4
Othman, M.5
-
24
-
-
34047160916
-
A security protocol for mobile agents based upon the cooperation of sedentary agents
-
DOI 10.1016/j.jnca.2006.04.008, PII S1084804506000427
-
Abdelhamid Ouardani, Samuel Pierre and Hanifa Boucheneb, A Security Protocol for Mobile Agents Based upon the Cooperation of Sedentary Agents, Journal of Network and Computer Applications, Vol. 30, No. 3, 2007, pp.1228-1243. (Pubitemid 46509452)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.3
, pp. 1228-1243
-
-
Ouardani, A.1
Pierre, S.2
Boucheneb, H.3
-
25
-
-
35348963026
-
TAMAP: A new trust-based approach for mobile agent protection
-
DOI 10.1007/s11416-007-0056-y
-
Salima Hacini, Zahia Guessoum and Zizette Boufaida, TAMAP: A New Trust-Based Approach for Mobile Agent Protection, Journal in Computer Virology, Vol. 3, No. 4, 2007, pp.267-283. (Pubitemid 47608139)
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.4
, pp. 267-283
-
-
Hacini, S.1
Guessoum, Z.2
Boufaida, Z.3
-
26
-
-
54949092856
-
Formal modeling and analysis of a secure mobile-agent system
-
Lu Ma and Jeffrey Tsai, Formal Modeling and Analysis of a Secure Mobile-Agent System, IEEE Transactions on Systems, Man, and Cybernetics, Part A:Systems and Humans, Vol. 38, No. 1, 2008, pp.180-196
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part A:Systems and Humans
, vol.38
, Issue.1
, pp. 180-196
-
-
Ma, L.1
Tsai, J.2
-
27
-
-
41549112489
-
A robust framework for protecting computation results of mobile agents
-
Abid Khan, Xiamu Niu and Zhang Yong, A Robust Framework for Protecting Computation Results of Mobile Agents, Information Technology Journal, Vol. 7, No. 1, 2008, pp.24-31. (Pubitemid 351461945)
-
(2008)
Information Technology Journal
, vol.7
, Issue.1
, pp. 24-31
-
-
Khan, A.1
Niu, X.2
Yong, Z.3
-
28
-
-
50149089676
-
Using co-operating agents for partial results protection in mobile agent paradigm
-
George Helmy, Magdy Ahmed and Mohamed El-Derini, Using Co-operating Agents for Partial Results Protection in Mobile Agent Paradigm, Alexandria Engineering Journal, Vol. 46, No. 5, 2007, pp.695-702.
-
(2007)
Alexandria Engineering Journal
, vol.46
, Issue.5
, pp. 695-702
-
-
Helmy, G.1
Ahmed, M.2
El-Derini, M.3
-
29
-
-
1142282727
-
How, can mobile agents do secure electronic transactions on untrusted hosts? a survey of the security issues and the current solutions
-
Joris Claessens, Bart Preneel and Joos Vandewalle, (How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions, ACM Transactions on Internet Technology, Vol. 3, No. 1, 2003, pp.28-48.
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.1
, pp. 28-48
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
30
-
-
4344662082
-
RSA-OAEP is secure under the RSA assumption
-
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval and Jacques Stern, RSA-OAEP is Secure under the RSA Assumption, Journal of Cryptology, Vol. 17, No. 2, 2004, pp.81-104.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.2
, pp. 81-104
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
31
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advances in Cryptology - CRYPTO '98
-
Ronald Cramer and Victor Shoup, A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proc. 18th Annual International Cryptology Conference, Santa Barbara, CA, August, 1998, pp.13-25. (Pubitemid 128118994)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
32
-
-
84947927799
-
Sliding encryption: A cryptographic tool for mobile agents
-
Fast Software Encryption
-
Adam Young and Moti Yung, Sliding Encryption: A Cryptographic Tool for Mobile Agents, Proc. FSE'97, Haifa, Israel, January, 1997, pp.230-241. (Pubitemid 127100719)
-
(1997)
Lecture Notes in Computer Science
, Issue.1267
, pp. 230-241
-
-
Young, A.1
Yung, M.2
-
33
-
-
78651078800
-
-
Ph.D., Thesis, Katholieke University, Leuven, Belgium
-
Brecht Wyseur, White-Box Cryptography, Ph.D. Thesis, Katholieke University, Leuven, Belgium, 2009.
-
(2009)
White-Box Cryptography
-
-
Wyseur, B.1
-
34
-
-
35248853376
-
A white-box des implementation for DRM applications
-
Washington, DC, November
-
Stanley Chow, Philip Eisen, Harold Johnson and Paul van Oorschot, A White-Box DES Implementation for DRM Applications, Proc. 2nd ACM Workshop on Digital Rights Management, Washington, DC, November, 2002, pp.1-15.
-
(2002)
Proc. 2nd ACM Workshop on Digital Rights Management
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.4
-
35
-
-
21144457759
-
White-box cryptography and an aes implementation
-
St. John's, NY, August
-
Stanley Chow, Philip Eisen, Harold Johnson and Paul van Oorschot, White-Box Cryptography and an AES Implementation, Proc. the Ninth Workshop on Selected Areas in Cryptography, St. John's, NY, August, 2002, pp.250-270.
-
(2002)
Proc. The Ninth Workshop on Selected Areas in Cryptography
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.4
-
36
-
-
35248830740
-
Attacking an obfuscated cipher by injecting faults
-
Washington, DC, November, 2002
-
Matthias Jacob, Dan Boneh and Edward Felten, Attacking an Obfuscated Cipher by Injecting Faults, Proc. ACM Digital Rights Management Workshop 2002, Washington, DC, November, 2002, pp.16-31.
-
Proc. ACM Digital Rights Management Workshop 2002
, pp. 16-31
-
-
Jacob, M.1
Boneh, D.2
Felten, E.3
-
37
-
-
24744446230
-
Clarifying obfuscation: Improving the security of white-box des
-
Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
-
Hamilton Link and William Neumann, Clarifying Obfuscation: Improving the Security of White-Box DES, Proc. International Conference on Information Technology: Coding and Computing, Albuquerque, NM, April, 2005, pp.679-684. (Pubitemid 41290173)
-
(2005)
International Conference on Information Technology: Coding and Computing, ITCC
, vol.1
, pp. 679-684
-
-
Link, H.E.1
Neumann, W.D.2
-
38
-
-
38549149185
-
Cryptanalysis of white-box des implementations with arbitrary external encodings
-
Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers
-
Brecht Wyseur, Wil Michiels, Paul Gorissen and Bart Preneel, Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings, Proc. The 14th Annual Workshop on Selected Areas in Cryptography, Ottawa, Canada, August, 2007, pp.264-277. (Pubitemid 351153090)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4876
, pp. 264-277
-
-
Wyseur, B.1
Michiels, W.2
Gorisseii, P.3
Preneel, B.4
-
39
-
-
84863249503
-
Cryptanalysis of white box des implementations
-
Ottawa, Canada, August
-
Louis Goubin, Jean-Michel Masereel and Michael Quisquater, Cryptanalysis of White Box DES Implementations, Proc. the 14th Annual Workshop on Selected Areas in Cryptography, Ottawa, Canada, August, 2007, pp.1611-3349.
-
(2007)
Proc. The 14th Annual Workshop on Selected Areas in Cryptography
, pp. 1611-3349
-
-
Goubin, L.1
Masereel, J.-M.2
Quisquater, M.3
-
40
-
-
35048833291
-
Cryptanalysis of a White Box AES Implementation
-
Olivier Billet, Henri Gilbert and Charaf Ech-Chatbi, Cryptanalysis of a White Box AES Implementation, Proc. of Selected Areas in Cryptography, Waterloo, Canada, August, 2004, pp.227-240. (Pubitemid 39743825)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3357
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
41
-
-
70350677133
-
Cryptanalysis of a generic class of white-box implementations
-
Sackville, Canada, August
-
Wil Michiels, Paul Gorissen and Henk Hollmann, Cryptanalysis of a Generic Class of White-Box Implementations, Proc. the 15th International Workshop on Selected Areas in Cryptography, Sackville, Canada, August, 2008, pp.414-428.
-
(2008)
Proc. The 15th International Workshop on Selected Areas in Cryptography
, pp. 414-428
-
-
Michiels, W.1
Gorissen, P.2
Hollmann, H.3
-
42
-
-
84958979426
-
The cipher SHARK
-
Cambridge, UK, Feburary
-
Vincent Rijmen, Joan Daemen, Bart Preneel, Anton Bosselaers and Erik De Win, The Cipher SHARK, Proc. 3rd International Workshop on Fast Software Encryption, Cambridge, UK, Feburary, 1996, pp.99-111.
-
(1996)
Proc. 3rd International Workshop on Fast Software Encryption
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
De Win, E.5
-
43
-
-
84947929289
-
The interpolation attack on block ciphers
-
Fast Software Encryption
-
Thomas Jakobsen and Lars Knudsen, The Interpolation Attack on Block Ciphers, Proc. 4th International Workshop on Fast Software Encryption, Haifa, Israel, Janurary, 1997, pp.28-40. (Pubitemid 127100701)
-
(1997)
Lecture Notes in Computer Science
, Issue.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
45
-
-
84957067784
-
An analytical comparison of the client-server, remote evaluation and mobile agents paradigms
-
Palm Springs, CA, October
-
Antonio Puliafito, Salvatore Riccobene and Marco Scarpa, An Analytical Comparison of the Client-Server, Remote Evaluation and Mobile Agents Paradigms, Proc. First International Symposium on Agent Systems and Applications, Palm Springs, CA, October, 1999, pp.278-292.
-
(1999)
Proc. First International Symposium on Agent Systems and Applications
, pp. 278-292
-
-
Puliafito, A.1
Riccobene, S.2
Scarpa, M.3
-
46
-
-
79952155434
-
Perspectives on electronic commerce with mobile agents
-
Moscow, Russia, November
-
Christoph Busch, Volker Roth and Ralph Meister, Perspectives on Electronic Commerce with Mobile Agents, Proc. XI Amaldi Conference on Problems of Global Security, Moscow, Russia, November, 1998, pp.1-13.
-
(1998)
Proc. XI Amaldi Conference on Problems of Global Security
, pp. 1-13
-
-
Busch, C.1
Roth, V.2
Meister, R.3
-
47
-
-
85014167243
-
Seven good reasons for mobile agents
-
Danny Lange and Mitsuru Oshima, Seven Good Reasons for Mobile Agents, Communications of the ACM, Vol. 42, No. 3, 1998, pp.88-89.
-
(1998)
Communications of the ACM
, vol.42
, Issue.3
, pp. 88-89
-
-
Lange, D.1
Oshima, M.2
-
48
-
-
79961038021
-
EBQP: Enhanced binary query protocol for RFID tag collision resolution with progressive population estimation
-
Xinqing Yan and Guiliang Zhu, EBQP: Enhanced Binary Query Protocol for RFID Tag Collision Resolution with Progressive Population Estimation, International Journal of Ad Hoc and Ubiquitous Computing, Vol. 8, No. 1/2, 2011, pp.78-84.
-
(2011)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.8
, Issue.1-2
, pp. 78-84
-
-
Yan, X.1
Zhu, G.2
-
49
-
-
79953269059
-
Mobile business via cross layer approach toward intelligent rfid purchasing system
-
Yao-Chung Chang and Hsing-Wen Wang, Mobile Business via Cross Layer Approach toward Intelligent RFID Purchasing System, Journal of Internet Technology, Vol. 11, No. 7, 2010, pp.965-974.
-
(2010)
Journal of Internet Technology
, vol.11
, Issue.7
, pp. 965-974
-
-
Chang, Y.-C.1
Wang, H.-W.2
-
50
-
-
33750291916
-
RFID systems: A survey on security threats and proposed solutions
-
Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
-
Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador and Arturo Ribagorda, RFID Systems: A Survey on Security Threats and Proposed Solutions, Proc. 11th International Conference on Personal Wireless Communications, Albacete, Spain, September, 2006, pp.159-170. (Pubitemid 44617810)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
51
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Boston, August
-
Martin Feldhofer, Sandra Dominikus and Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Proc. CHES'04, Boston, August, 2004, pp.357-370.
-
(2004)
Proc. CHES'04
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
52
-
-
80052479494
-
A novel design of data-driven architecture for remote monitoring and remote control of sensors over a wireless sensor network and the internet
-
Yuan-Jen Chang and Wen-Tzeng Huang, A Novel Design of Data-Driven Architecture for Remote Monitoring and Remote Control of Sensors over a Wireless Sensor Network and the Internet, Journal of Internet Technology, Vol. 12, No. 1, 2011, pp.129-137.
-
(2011)
Journal of Internet Technology
, vol.12
, Issue.1
, pp. 129-137
-
-
Chang, Y.-J.1
Huang, W.-T.2
-
53
-
-
77950323176
-
A solution for the interconnection between WSN and WiMAX Network based on gateway
-
Yu Lin and Wei Yang, A Solution for the Interconnection between WSN and WiMAX Network Based on Gateway, Journal of Internet Technology, Vol. 10, No. 4, 2009, pp.319-323.
-
(2009)
Journal of Internet Technology
, vol.10
, Issue.4
, pp. 319-323
-
-
Lin, Y.1
Yang, W.2
-
54
-
-
70349645089
-
A review of wireless sensor technologies and applications
-
Luis Ruiz-Garcia, Loredana Lunadei, Pilar Barreiro and Jose Ignacio Robla, A Review of Wireless Sensor Technologies and Applications in Agriculture and Food Industry: State of the Art and Current Trends Sensors, Vol. 9, No. 6, 2009, pp.4728-4750.
-
(2009)
Agriculture and Food Industry: State of the Art and Current Trends Sensors
, vol.9
, Issue.6
, pp. 4728-4750
-
-
Ruiz-Garcia, L.1
Lunadei, L.2
Barreiro, P.3
Ignacio Robla, J.4
-
55
-
-
67650461985
-
Privacy preservation in wireless sensor networks
-
Na Li, Nan Zhang, Sajal Das and Bhavani Thuraisingham, Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey Ad Hoc Networks, Vol. 7, No. 8, 2009, pp.1501-1514.
-
(2009)
A State-of-the-Art Survey Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.3
Thuraisingham, B.4
-
56
-
-
80053289628
-
Multiple mobile agents itinerary planning in wireless sensor networks: Survey and evaluation
-
Xiaofei Wang, Min Chen, Taekyoung Kwon and Han-Chieh Chao, Multiple Mobile Agents Itinerary Planning in Wireless Sensor Networks: Survey and Evaluation, IET Communications, Vol. 5, No. 12, 2011, pp.1769-1776.
-
(2011)
IET Communications
, vol.5
, Issue.12
, pp. 1769-1776
-
-
Wang, X.1
Chen, M.2
Kwon, T.3
Chao, H.-C.4
|