![]() |
Volumn 1477 LNCS, Issue , 1998, Pages 195-207
|
Protecting the computation results of free-roaming agents
|
Author keywords
[No Author keywords available]
|
Indexed keywords
PUBLIC KEY CRYPTOGRAPHY;
COMPARISON SHOPPING;
HASH CHAINS;
MALICIOUS HOST;
NON-REPUDIABILITY;
PUBLIC KEY INFRASTRUCTURE;
ROAMING AGENTS;
MOBILE AGENTS;
|
EID: 84867313902
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/bfb0057659 Document Type: Conference Paper |
Times cited : (88)
|
References (9)
|