메뉴 건너뛰기




Volumn 1477 LNCS, Issue , 1998, Pages 172-182

Mobile agents and intellectual property protection

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; INTELLECTUAL PROPERTY; INTERNET PROTOCOLS;

EID: 84867290394     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0057657     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • Ross Anderson
    • Ross Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39-48, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 39-48
  • 7
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • ACM, October
    • B. Lampson. A note on the confinement problem. In Communications of the ACM, pages 613-615. ACM, October 1973.
    • (1973) Communications of the ACM , pp. 613-615
    • Lampson, B.1
  • 10
    • 0000133669 scopus 로고    scopus 로고
    • Mobile agents
    • J. Bradshaw, editor AAAI Press and MIT Press
    • J. E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press and MIT Press, 1996.
    • (1996) Software Agents
    • White, J.E.1
  • 11
    • 0004196480 scopus 로고
    • PhD thesis, School of Computer Science, Carnegie Mellon University, May CMU-CS-94-149
    • Bennet S. Yee. Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149.
    • (1994) Using Secure Coprocessors
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.