메뉴 건너뛰기




Volumn 1477 LNCS, Issue , 1998, Pages 183-194

Ensuring the integrity of agent - Based computations by short proofs

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); MOBILE COMMERCE;

EID: 84867304375     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0057658     Document Type: Conference Paper
Times cited : (32)

References (22)
  • 3
    • 33746365751 scopus 로고
    • Secure multiparty computation protocols and zero-knowledge proof systems tolerating a faulty minority
    • Springer
    • D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, Springer, pp. 75-122, 1991.
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 5
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its application
    • (Extended Abstract)
    • M. Blum, P. Feldman, S. Micali, Non-Interactive Zero-Knowledge and Its Application (Extended Abstract), Proc. of the 20th ACM STOC, pp. 103-112, 1988.
    • (1988) Proc. of the 20th ACM STOC , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 7
    • 0346698930 scopus 로고    scopus 로고
    • Trust management and proof-carrying code in secure mobile-code applications
    • Monterey, CA, USA Position Paper
    • J. Feigenbaum, P. Lee, Trust Management and Proof-Carrying Code in Secure Mobile-Code Applications, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
    • (1997) DARPA Workshop on Foundations for Secure Mobile Code
    • Feigenbaum, J.1    Lee, P.2
  • 10
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Giovanni Vigna (Ed.) Lecture Notes in Computer Science, Springer
    • F. Hohl, Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.
    • (1997) Mobile Agents and Security
    • Hohl, F.1
  • 12
    • 84867318820 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • E. Kushilevitz, R. Ostrovsky, Replication is Not Needed: Single Database, Computationally-Private Information Retrieval, Proc. of the 29th ACM STOC, 1997.
    • (1997) Proc. of the 29th ACM STOC
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 13
    • 0012361674 scopus 로고    scopus 로고
    • Research on proof-carrying code for mobile-code security
    • Monterey, CA, USA Position Paper
    • P. Lee, G. Necula, Research on Proof-Carrying Code For Mobile-Code Security, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
    • (1997) DARPA Workshop on Foundations for Secure Mobile Code
    • Lee, P.1    Necula, G.2
  • 14
    • 85077206746 scopus 로고
    • The bsd packet filter: A new architecture for user-level packet capture
    • S. McCanne, V. Jacobson, The bsd Packet Filter: A New Architecture for User-level Packet Capture, Proc. of the USENIX Technical Conference, pp. 259-269, 1993.
    • (1993) Proc. of the USENIX Technical Conference , pp. 259-269
    • McCanne, S.1    Jacobson, V.2
  • 18
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Giovanni Vigna (Ed.) Lecture Notes in Computer Science, Springer
    • T. Sander, C. T. Tschudin, Protecting Mobile Agents Against Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.
    • (1997) Mobile Agents and Security
    • Sander, T.1    Tschudin, C.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.