-
1
-
-
84871684669
-
Deployment of secure mobile agents for medical information systems
-
doi: 10.1007/s10916-011-9716-z
-
Chen, T. L.; Chung, Y. F.; and Lin, F. Y. S.; Deployment of secure mobile agents for medical information systems. J. Med. Syst.; 2011. doi: 10.1007/s10916-011-9716-z.
-
(2011)
J. Med. Syst.
-
-
Chen, T.L.1
Chung, Y.F.2
Lin, F.Y.S.3
-
3
-
-
0035917655
-
Mobile agents: An introduction
-
10.1016/S0141-9331(01)00099-0
-
Gian, P. P.; Mobile agents: An introduction. Microprocess. Microsyst. 25:65-74, 2001.
-
(2001)
Microprocess. Microsyst.
, vol.25
, pp. 65-74
-
-
Gian, P.P.1
-
4
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
2388983 1186.68157 10.1016/j.ipl.2007.09.007
-
Biskup, J.; Embley, D. W.; and Lochner, J. H.; Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106:8-12, 2008.
-
(2008)
Inf. Process. Lett.
, vol.106
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.H.3
-
5
-
-
33746169048
-
Secure brokerage mechanisms for mobile electronic commerce
-
10.1016/j.comcom.2006.03.005
-
Esparza, O.; Muñoz, J. L.; Soriano, M.; and Forné, J.; Secure brokerage mechanisms for mobile electronic commerce. Comput. Commun. 29:2308-2321, 2006.
-
(2006)
Comput. Commun.
, vol.29
, pp. 2308-2321
-
-
Esparza, O.1
Muñoz, J.L.2
Soriano, M.3
Forné, J.4
-
6
-
-
79953730258
-
An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce
-
10.1016/j.eswa.2011.02.039
-
Chung, Y. F.; Chen, Y. T.; Chen, T. L.; and Chen, T. S.; An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Syst. Appl. 38(8):9900-9907, 2011.
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.8
, pp. 9900-9907
-
-
Chung, Y.F.1
Chen, Y.T.2
Chen, T.L.3
Chen, T.S.4
-
7
-
-
79551555868
-
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem
-
Nikooghadam, M.; and Zakerolhosseini, A.; An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. ISecure: ISC Int'l J. Inf. Secur. 8(10):125-131, 2009.
-
(2009)
ISecure: ISC Int'l J. Inf. Secur.
, vol.8
, Issue.10
, pp. 125-131
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
8
-
-
34250306664
-
Threshold cryptography in P2P and MANETs: The case of access control
-
1118.68484 10.1016/j.comnet.2007.03.001
-
Saxena, N.; Tsudik, G.; and Yi, J. H.; Threshold cryptography in P2P and MANETs: The case of access control. Comput. Netw. 51:3632-3649, 2007.
-
(2007)
Comput. Netw.
, vol.51
, pp. 3632-3649
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
9
-
-
33646842835
-
HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems
-
10.1016/j.compbiomed.2005.04.010
-
Orgun, B.; and Vu, J.; HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Comput. Biol. Med. 36:817-836, 2006.
-
(2006)
Comput. Biol. Med.
, vol.36
, pp. 817-836
-
-
Orgun, B.1
Vu, J.2
-
10
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in e-medicine system
-
Springer, doi: 10.1007/s10916-011-9700-7
-
Wu, S.; and Chen K. An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst.; Springer, doi: 10.1007/s10916-011-9700-7, 2011.
-
(2011)
J. Med. Syst.
-
-
Wu, S.1
Chen, K.2
-
11
-
-
2342658269
-
Two secure transportation schemes for mobile agents
-
Lin, I. C.; Ou, H. H.; and Hwang, M. S.; Two secure transportation schemes for mobile agents. Int. J. Inf. Secur. 8:87-97, 2002.
-
(2002)
Int. J. Inf. Secur.
, vol.8
, pp. 87-97
-
-
Lin, I.C.1
Ou, H.H.2
Hwang, M.S.3
-
12
-
-
84964820465
-
-
IEEE Computer Society Press Cape Town, South Africa 10.1109/FTDCS.1999. 818777
-
Corradi, A.; Montanari, R.; and Stefanelli, C.; Security issues in mobile agent technology, proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '99). IEEE Computer Society Press, Cape Town, South Africa, pp. 3-8, 1999.
-
(1999)
Security Issues in Mobile Agent Technology, Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '99)
, pp. 3-8
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
13
-
-
0033702826
-
A security architecture for mobile agents in Ajanta
-
Taipei, Taiwan
-
Karnik, N. M.; Tripathi, A. R. A security architecture for mobile agents in Ajanta, Proceedings of the International Conference on Distributed Computing Systems, Taipei, Taiwan, 402-409, 2000.
-
(2000)
Proceedings of the International Conference on Distributed Computing Systems
, pp. 402-409
-
-
Karnik, N.M.1
Tripathi, A.R.2
-
14
-
-
0032121340
-
Access control and key management for mobile agents
-
10.1016/S0097-8493(98)00035-1
-
Volker, R.; and Mehrdad, J. S.; Access control and key management for mobile agents. Comput. Graph. 22:457-461, 1998.
-
(1998)
Comput. Graph.
, vol.22
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
15
-
-
32644451622
-
A new solution for assigning cryptographic keys to control access in mobile agent environments
-
10.1002/wcm.276
-
Chang, C. C.; and Lin, I. C.; A new solution for assigning cryptographic keys to control access in mobile agent environments. Wirel. Commun. Mob. Comput. 6:137-146, 2006.
-
(2006)
Wirel. Commun. Mob. Comput.
, vol.6
, pp. 137-146
-
-
Chang, C.C.1
Lin, I.C.2
-
16
-
-
54349095337
-
Efficient migration for mobile computing in distributed networks
-
10.1016/j.csi.2007.10.011
-
Huang, K. H.; Chung, Y. F.; Liu, C. H.; Lai, F.; and Chen, T. S.; Efficient migration for mobile computing in distributed networks. Comput. Stand. Int. 31:40-47, 2009.
-
(2009)
Comput. Stand. Int.
, vol.31
, pp. 40-47
-
-
Huang, K.H.1
Chung, Y.F.2
Liu, C.H.3
Lai, F.4
Chen, T.S.5
-
17
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
10.1016/S1363-4127(97)81331-3
-
Vanstone, S. A.; Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf. Secur. Tech. Rep. 12:78-87, 1997.
-
(1997)
Inf. Secur. Tech. Rep.
, vol.12
, pp. 78-87
-
-
Vanstone, S.A.1
-
19
-
-
84864031689
-
Mobile agent application and integration in electronic anamnesis system
-
doi: 10.1007/s10916-010-9563-3
-
Liu, C. H.; Chung, Y. F.; Chen, Th, and De Wang, S.; Mobile agent application and integration in electronic anamnesis system. J. Med. Syst.; 2011. doi: 10.1007/s10916-010-9563-3.
-
(2011)
J. Med. Syst.
-
-
Liu, C.H.1
Chung, Y.F.2
Th, C.3
De Wang, S.4
-
20
-
-
84944878354
-
-
CRC Press Boca Raton, Florida, USA 0868.94001
-
Menezes, A. J.; van Oorschot, P. C.; and Vanstone, S. A.; Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida, USA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
21
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
10.1016/j.jss.2010.05.072
-
Nikooghadam, M.; Zakerolhosseini, A.; and Ebrahimi Moghadam, M.; Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83:1917-1929, 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Ebrahimi Moghadam, M.3
-
22
-
-
79551551986
-
An efficient key management scheme for mobile agents in distributed networks
-
Nikooghadam, M, Safaei F.; and Zakerolhosseini A. An efficient key management scheme for mobile agents in distributed networks, IEEE, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), 2010.
-
(2010)
IEEE, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)
-
-
Nikooghadam Safaei, M.F.1
Zakerolhosseini, A.2
-
24
-
-
46149115413
-
A protocol for digital signature based on the elliptic curve discrete logarithm problem
-
10.3923/jas.2008.1919.1925
-
Nikooghadam, M.; Bonyadi, M. R.; Malekian, E.; and Zakerolhosseini, A.; A protocol for digital signature based on the elliptic curve discrete logarithm problem. J. Appl. Sci. 8(10):1919-1925, 2008.
-
(2008)
J. Appl. Sci.
, vol.8
, Issue.10
, pp. 1919-1925
-
-
Nikooghadam, M.1
Bonyadi, M.R.2
Malekian, E.3
Zakerolhosseini, A.4
-
25
-
-
0019693723
-
Probabilistic Algorithms in Finite Fields
-
Nashville, Tennessee, USA, 28-30 October
-
Ben-Or, M.; Probabilistic Algorithms in Finite Fields, 22nd Annual Symposium on Foundations of Computer Science, Nashville, Tennessee, USA, 28-30 October 1981, pp. 394-398.
-
(1981)
22nd Annual Symposium on Foundations of Computer Science
, pp. 394-394
-
-
Ben-Or, M.1
-
27
-
-
79751531498
-
Secure key management scheme for dynamic hierarchical access control based on ECC
-
10.1016/j.jss.2010.11.926
-
Lin, Y. L.; and Hsu, C. L.; Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84:679-685, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, pp. 679-685
-
-
Lin, Y.L.1
Hsu, C.L.2
-
28
-
-
0348003132
-
The state of elliptic curve cryptography
-
1759616 0996.94032 10.1023/A:1008354106356
-
Koblitz, N.; Menezes, A.; and Vanstone, S. A.; The state of elliptic curve cryptography. Des. Code Crypt. 19:173-193, 2000.
-
(2000)
Des. Code Crypt.
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
-
29
-
-
84864069578
-
A study on agent-based secure scheme for electronic medical record system
-
doi: 10.1007/s10916-010-9595-8
-
Chen, T. L.; Chung, Y. F.; and Lin, F. Y. S.; A study on agent-based secure scheme for electronic medical record system. J. Med. Syst.; 2010. doi: 10.1007/s10916-010-9595-8.
-
(2010)
J. Med. Syst.
-
-
Chen, T.L.1
Chung, Y.F.2
Lin, F.Y.S.3
-
30
-
-
84867288768
-
A Mobile Agent Approach for Secure Integrated Medical Information Systems
-
doi: 10.1007/s10916-011-9749-3
-
Liu, C.H.; Chung, Y.F.; Chiang, T.W.; T.S.; Chen, and Wang, S.D.; A Mobile Agent Approach for Secure Integrated Medical Information Systems. J of Med Syst.; 2011, doi: 10.1007/s10916-011-9749-3.
-
(2011)
J of Med Syst.
-
-
Liu, C.H.1
Chung, Y.F.2
Chiang, T.W.3
Chen, T.S.4
Wang, S.D.5
|